Horilla is a free and open source Human Resource Management System (HRMS). A critical File Upload vulnerability in versions prior to 1.5.0, with Social Engineering, allows authenticated users to deploy phishing attacks. By uploading a malicious HTML file disguised as a profile picture, an attacker can create a convincing login page replica that steals user credentials. When a victim visits the uploaded file URL, they see an authentic-looking "Session Expired" message prompting them to re-authenticate. All entered credentials are captured and sent to the attacker's server, enabling Account Takeover. Version 1.5.0 patches the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Horilla
Horilla horilla |
|
| Vendors & Products |
Horilla
Horilla horilla |
Thu, 22 Jan 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 22 Jan 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Horilla is a free and open source Human Resource Management System (HRMS). A critical File Upload vulnerability in versions prior to 1.5.0, with Social Engineering, allows authenticated users to deploy phishing attacks. By uploading a malicious HTML file disguised as a profile picture, an attacker can create a convincing login page replica that steals user credentials. When a victim visits the uploaded file URL, they see an authentic-looking "Session Expired" message prompting them to re-authenticate. All entered credentials are captured and sent to the attacker's server, enabling Account Takeover. Version 1.5.0 patches the issue. | |
| Title | Horilla has HTML Injection Issue that, with Phishing, Leads to Account Takeover | |
| Weaknesses | CWE-474 CWE-74 |
|
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-01-22T02:37:19.130Z
Updated: 2026-01-22T12:48:02.914Z
Reserved: 2026-01-19T18:49:20.660Z
Link: CVE-2026-24010
Updated: 2026-01-22T12:47:58.389Z
Status : Received
Published: 2026-01-22T03:15:48.090
Modified: 2026-01-22T03:15:48.090
Link: CVE-2026-24010
No data.