Home

Description

HireFlow v1.2 does not implement CSRF token validation on any state-changing POST endpoint. All forms (password change at /profile, candidate deletion at /candidates/delete/<id>, feedback submission at /feedback/add/<id>, interview scheduling at /interviews/add) are vulnerable to CSRF. An attacker who can trick an authenticated user into visiting a malicious page can silently change the victim's password, delete records, or inject arbitrary data on their behalf. The SESSION_COOKIE_SAMESITE attribute is also not configured, removing the browser-level CSRF defense.

PUBLISHED Reserved 2026-04-06 | Published 2026-05-11 | Updated 2026-05-11 | Assigner mitre

References

github.com/StratonWebDesigners/HireFlow

www.sourcecodester.com/...e-interview-management-system.html

github.com/...-Disclosures/tree/main/HireFlow/CVE-2026-38566

cve.org (CVE-2026-38566)

nvd.nist.gov (CVE-2026-38566)

Download JSON