Home

Description

HireFlow v1.2 is vulnerable to Incorrect Access Control. The application does not enforce object-level authorization on the /candidate/<id> and /interview/<id> endpoints. The route handlers retrieve records by the user-supplied ID without verifying that the requesting user is the owner or has an authorized role. Any authenticated user can access any other user's candidate profiles and interview notes by iterating the integer ID in the URL path, constituting a horizontal privilege escalation and full data breach of all records in the system.

PUBLISHED Reserved 2026-04-06 | Published 2026-05-11 | Updated 2026-05-11 | Assigner mitre

References

github.com/StratonWebDesigners/HireFlow

www.sourcecodester.com/...e-interview-management-system.html

github.com/...-Disclosures/tree/main/HireFlow/CVE-2026-38568

cve.org (CVE-2026-38568)

nvd.nist.gov (CVE-2026-38568)

Download JSON