Home

Description

Horilla is a free and open source Human Resource Management System (HRMS). A stored cross-site scripting (XSS) vulnerability in Horilla HRM 1.3.0 allows authenticated admin or privileged users to inject malicious JavaScript payloads into multiple fields in the Project and Task modules. These payloads persist in the database and are executed when viewed by an admin or other privileged users through the web interface. Although the issue is not exploitable by unauthenticated users, it still poses a high risk of session hijacking and unauthorized action within high-privilege accounts. At time of publication there is no known patch.

PUBLISHED Reserved 2025-05-27 | Published 2025-09-24 | Updated 2025-09-24 | Assigner GitHub_M




MEDIUM: 4.8CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

= 1.3.0
affected

References

github.com/...orilla/security/advisories/GHSA-w242-xv47-j55r

cve.org (CVE-2025-48867)

nvd.nist.gov (CVE-2025-48867)

Download JSON