CVE-2025-59524

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-59524
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-59524.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-59524
Aliases
  • GHSA-mff9-p8j9-9v5q
Published
2025-09-24T18:12:55.990Z
Modified
2025-12-05T10:20:56.869174Z
Severity
  • 7.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N CVSS Calculator
Summary
Horilla Stored XSS Vulnerability via File Upload in Reimbursement Panel
Details

Horilla is a free and open source Human Resource Management System (HRMS). Prior to version 1.4.0, the file upload flow performs validation only in the browser and does not enforce server-side checks. An attacker can bypass the client-side validation (for example, with an intercepting proxy or by submitting a crafted request) to store an executable HTML document on the server. When an administrator or other privileged user views the uploaded file, the embedded script runs in their context and sends session cookies (or other credentials) to an attacker-controlled endpoint. The attacker then reuses those credentials to impersonate the admin. This issue has been patched in version 1.4.0.

Database specific
{
    "cwe_ids": [
        "CWE-434",
        "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/59xxx/CVE-2025-59524.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/horilla-opensource/horilla

Affected ranges

Type
GIT
Repo
https://github.com/horilla-opensource/horilla
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0.0
1.1.0
1.2.0
1.2.1
1.2.2
1.2.3
1.3
1.3.1
1.3.2