Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | SQL Injection in HireFlow v1.2 Enables unauthenticated access and credential theft |
Tue, 12 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Stratonwebdesigners
Stratonwebdesigners hireflow |
|
| Vendors & Products |
Stratonwebdesigners
Stratonwebdesigners hireflow |
Mon, 11 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | SQL Injection in HireFlow v1.2 Enables unauthenticated access and credential theft | |
| Weaknesses | CWE-89 |
Mon, 11 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HireFlow v1.2 is vulnerable to SQL injection in the /login and /search endpoints. User-supplied input is concatenated directly into SQL queries without parameterization. An unauthenticated attacker can bypass authentication by supplying a crafted username (e.g. admin'--) or extract the full contents of the database including user credentials via UNION-based injection at the /search endpoint. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-12T13:41:28.200Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-38567
Updated: 2026-05-12T13:40:50.310Z
Status : Deferred
Published: 2026-05-11T18:16:32.857
Modified: 2026-05-12T15:06:07.407
Link: CVE-2026-38567
No data.
OpenCVE Enrichment
Updated: 2026-05-12T15:45:06Z