Description
Horilla is a free and open source Human Resource Management System (HRMS). In version 1.4.0, the OTP handling logic has a flawed equality check that can be bypassed. When an OTP expires, the server returns None, and if an attacker omits the otp field from their POST request, the user-supplied OTP is also None, causing the comparison user_otp == otp to pass. This allows an attacker to bypass two-factor authentication entirely without ever providing a valid OTP. If administrative accounts are targeted, it could lead to compromise of sensitive HR data, manipulation of employee records, and further system-wide abuse. This issue has been fixed in version 1.5.0.
INFO
Published Date :
2026-01-22T03:39:06.216Z
Last Modified :
2026-01-22T12:33:39.694Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-24038 vulnerability.
| Vendors | Products |
|---|---|
| Horilla |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-24038.