Horilla is a free and open source Human Resource Management System (HRMS). In version 1.4.0, the has_xss() function attempts to block XSS by matching input against a set of regex patterns. However, the regexes are incomplete and context-agnostic, making them easy to bypass. Attackers are able to redirect users to malicious domains, run external JavaScript, and steal CSRF tokens that can be used to craft CSRF attacks against admins. This issue has been fixed in version 1.5.0.
References
| Link | Resource |
|---|---|
| https://github.com/horilla-opensource/horilla/releases/tag/1.5.0 | Release Notes |
| https://github.com/horilla-opensource/horilla/security/advisories/GHSA-rqw5-fjm4-rgvm | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-22 04:15
Updated : 2026-01-29 18:56
NVD link : CVE-2026-24037
Mitre link : CVE-2026-24037
CVE.ORG link : CVE-2026-24037
JSON object : View
Products Affected
horilla
- horilla
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
