Description
HireFlow v1.2 is vulnerable to Incorrect Access Control. The application does not enforce object-level authorization on the /candidate/<id> and /interview/<id> endpoints. The route handlers retrieve records by the user-supplied ID without verifying that the requesting user is the owner or has an authorized role. Any authenticated user can access any other user's candidate profiles and interview notes by iterating the integer ID in the URL path, constituting a horizontal privilege escalation and full data breach of all records in the system.
References
github.com/StratonWebDesigners/HireFlow
www.sourcecodester.com/...e-interview-management-system.html
github.com/...-Disclosures/tree/main/HireFlow/CVE-2026-38568