CVE-2026-24038

Source
https://cve.org/CVERecord?id=CVE-2026-24038
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24038.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-24038
Aliases
  • GHSA-hqpv-ff5v-3hwf
Published
2026-01-22T03:39:06.216Z
Modified
2026-03-01T02:56:48.007304Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Horilla HR has 2FA Bypass through its OTP Handling Logic
Details

Horilla is a free and open source Human Resource Management System (HRMS). In version 1.4.0, the OTP handling logic has a flawed equality check that can be bypassed. When an OTP expires, the server returns None, and if an attacker omits the otp field from their POST request, the user-supplied OTP is also None, causing the comparison user_otp == otp to pass. This allows an attacker to bypass two-factor authentication entirely without ever providing a valid OTP. If administrative accounts are targeted, it could lead to compromise of sensitive HR data, manipulation of employee records, and further system-wide abuse. This issue has been fixed in version 1.5.0.

Database specific
{
    "cwe_ids": [
        "CWE-287"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/24xxx/CVE-2026-24038.json"
}
References

Affected packages

Git / github.com/horilla-opensource/horilla

Affected ranges

Type
GIT
Repo
https://github.com/horilla-opensource/horilla
Events

Affected versions

1.*
1.4.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24038.json"