CVE-2026-24035

4.3 MEDIUM

📋 TL;DR

This vulnerability allows any authenticated employee in Horilla HRMS to upload documents on behalf of any other employee without proper authorization. It affects organizations using Horilla HR Software versions 1.4.0 through 1.4.x. The issue stems from insufficient server-side validation of employee_id parameters during file upload operations.

💻 Affected Systems

Products:
  • Horilla HR Software
Versions: 1.4.0 through 1.4.x (prior to 1.5.0)
Operating Systems: All platforms where Horilla is deployed
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable if not patched. The vulnerability requires authenticated access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious employees could upload malicious files, forge documents, or plant evidence in other employees' records, potentially leading to HR disputes, compliance violations, or legal issues.

🟠

Likely Case

Employees could upload inappropriate or misleading documents to colleagues' records, causing confusion, HR investigations, or minor data integrity issues.

🟢

If Mitigated

With proper access controls, only authorized personnel can upload documents to specific employee records, maintaining data integrity and compliance.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated employee access and involves manipulating the employee_id parameter during document uploads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.0

Vendor Advisory: https://github.com/horilla-opensource/horilla/security/advisories/GHSA-fm3f-xpgx-8xr3

Restart Required: Yes

Instructions:

1. Backup your Horilla database and application files. 2. Download version 1.5.0 from the official GitHub releases. 3. Replace existing installation files with the new version. 4. Run any database migrations if required. 5. Restart the application server.

🔧 Temporary Workarounds

Implement server-side validation middleware

all

Add custom server-side validation to ensure employee_id matches the authenticated user's permissions before processing uploads.

# Requires modifying Horilla source code to add validation logic in upload handlers

Restrict upload permissions

all

Temporarily limit document upload functionality to HR administrators only until patching is complete.

# Modify user role permissions in Horilla to disable uploads for regular employees

🧯 If You Can't Patch

  • Implement network segmentation to isolate the HRMS system from regular employee networks, limiting access to authorized personnel only.
  • Enable detailed audit logging for all document upload activities and implement regular log reviews to detect unauthorized upload attempts.

🔍 How to Verify

Check if Vulnerable:

Check the Horilla version in the application settings or admin panel. If version is between 1.4.0 and 1.4.x, the system is vulnerable.

Check Version:

Check the version in Horilla admin panel or examine the application's version file if accessible.

Verify Fix Applied:

After upgrading to 1.5.0, test document upload functionality with different employee accounts to ensure they can only upload to their own records.

📡 Detection & Monitoring

Log Indicators:

  • Unusual document upload patterns
  • Uploads from employee accounts targeting other employee IDs
  • Failed authorization attempts for document uploads

Network Indicators:

  • HTTP POST requests to document upload endpoints with mismatched employee_id parameters

SIEM Query:

source="horilla_logs" AND (event="document_upload" AND user_id != target_employee_id)

🔗 References

📤 Share & Export