Horilla is a free and open source Human Resource Management System (HRMS). In version 1.4.0, the OTP handling logic has a flawed equality check that can be bypassed. When an OTP expires, the server returns None, and if an attacker omits the otp field from their POST request, the user-supplied OTP is also None, causing the comparison user_otp == otp to pass. This allows an attacker to bypass two-factor authentication entirely without ever providing a valid OTP. If administrative accounts are targeted, it could lead to compromise of sensitive HR data, manipulation of employee records, and further system-wide abuse. This issue has been fixed in version 1.5.0.
References
| Link | Resource |
|---|---|
| https://github.com/horilla-opensource/horilla/releases/tag/1.5.0 | Release Notes |
| https://github.com/horilla-opensource/horilla/security/advisories/GHSA-hqpv-ff5v-3hwf | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-22 04:15
Updated : 2026-01-29 18:54
NVD link : CVE-2026-24038
Mitre link : CVE-2026-24038
CVE.ORG link : CVE-2026-24038
JSON object : View
Products Affected
horilla
- horilla
CWE
CWE-287
Improper Authentication
