Horilla is a free and open source Human Resource Management System (HRMS). A stored cross-site scripting (XSS) vulnerability in Horilla HRM 1.3.0 allows authenticated admin or privileged users to inject malicious JavaScript payloads into multiple fields in the Project and Task modules. These payloads persist in the database and are executed when viewed by an admin or other privileged users through the web interface. Although the issue is not exploitable by unauthenticated users, it still poses a high risk of session hijacking and unauthorized action within high-privilege accounts. At time of publication there is no known patch.
References
| Link | Resource |
|---|---|
| https://github.com/horilla-opensource/horilla/security/advisories/GHSA-w242-xv47-j55r | Exploit Vendor Advisory |
Configurations
History
29 Sep 2025, 14:06
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:horilla:horilla:1.3:*:*:*:*:*:*:* | |
| First Time |
Horilla horilla
Horilla |
|
| References | () https://github.com/horilla-opensource/horilla/security/advisories/GHSA-w242-xv47-j55r - Exploit, Vendor Advisory |
24 Sep 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-24 18:15
Updated : 2025-09-29 14:06
NVD link : CVE-2025-48867
Mitre link : CVE-2025-48867
CVE.ORG link : CVE-2025-48867
JSON object : View
Products Affected
horilla
- horilla
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
