Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 29 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-434 | |
| CPEs | cpe:2.3:a:horilla:horilla:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Horilla
Horilla horilla |
|
| Vendors & Products |
Horilla
Horilla horilla |
Thu, 22 Jan 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 22 Jan 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Horilla is a free and open source Human Resource Management System (HRMS). A critical File Upload vulnerability in versions prior to 1.5.0, with Social Engineering, allows authenticated users to deploy phishing attacks. By uploading a malicious HTML file disguised as a profile picture, an attacker can create a convincing login page replica that steals user credentials. When a victim visits the uploaded file URL, they see an authentic-looking "Session Expired" message prompting them to re-authenticate. All entered credentials are captured and sent to the attacker's server, enabling Account Takeover. Version 1.5.0 patches the issue. | |
| Title | Horilla has HTML Injection Issue that, with Phishing, Leads to Account Takeover | |
| Weaknesses | CWE-474 CWE-74 |
|
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-22T12:48:02.914Z
Reserved: 2026-01-19T18:49:20.660Z
Link: CVE-2026-24010
Updated: 2026-01-22T12:47:58.389Z
Status : Analyzed
Published: 2026-01-22T03:15:48.090
Modified: 2026-01-29T20:00:49.013
Link: CVE-2026-24010
No data.
OpenCVE Enrichment
Updated: 2026-04-18T15:30:03Z