Vulnerability Description
Horilla is a free and open source Human Resource Management System (HRMS). In version 1.4.0, the has_xss() function attempts to block XSS by matching input against a set of regex patterns. However, the regexes are incomplete and context-agnostic, making them easy to bypass. Attackers are able to redirect users to malicious domains, run external JavaScript, and steal CSRF tokens that can be used to craft CSRF attacks against admins. This issue has been fixed in version 1.5.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Horilla | Horilla | 1.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/horilla-opensource/horilla/releases/tag/1.5.0Release Notes
- https://github.com/horilla-opensource/horilla/security/advisories/GHSA-rqw5-fjm4ExploitVendor Advisory
FAQ
What is CVE-2026-24037?
CVE-2026-24037 is a vulnerability with a CVSS score of 4.8 (MEDIUM). Horilla is a free and open source Human Resource Management System (HRMS). In version 1.4.0, the has_xss() function attempts to block XSS by matching input against a set of regex patterns. However, th...
How severe is CVE-2026-24037?
CVE-2026-24037 has been rated MEDIUM with a CVSS base score of 4.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-24037?
Check the references section above for vendor advisories and patch information. Affected products include: Horilla Horilla.