Home

Description

Horilla is a free and open source Human Resource Management System (HRMS). In version 1.4.0, the OTP handling logic has a flawed equality check that can be bypassed. When an OTP expires, the server returns None, and if an attacker omits the otp field from their POST request, the user-supplied OTP is also None, causing the comparison user_otp == otp to pass. This allows an attacker to bypass two-factor authentication entirely without ever providing a valid OTP. If administrative accounts are targeted, it could lead to compromise of sensitive HR data, manipulation of employee records, and further system-wide abuse. This issue has been fixed in version 1.5.0.

PUBLISHED Reserved 2026-01-20 | Published 2026-01-22 | Updated 2026-01-22 | Assigner GitHub_M




HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-287: Improper Authentication

Product status

>= 1.4.0, < 1.5.0
affected

References

github.com/...orilla/security/advisories/GHSA-hqpv-ff5v-3hwf

github.com/horilla-opensource/horilla/releases/tag/1.5.0

cve.org (CVE-2026-24038)

nvd.nist.gov (CVE-2026-24038)

Download JSON