CVE-2025-59832
Horilla · Horilla is a free and open source Human Resource Management System Multiple Products
A critical vulnerability has been discovered in the Horilla Human Resource Management System (HRMS) that allows a low-privilege user to inject malicious code into the system's ticket comments.
Executive summary
A critical vulnerability has been discovered in the Horilla Human Resource Management System (HRMS) that allows a low-privilege user to inject malicious code into the system's ticket comments. This code can then execute in the web browsers of other users, including high-privilege administrators, potentially leading to account takeovers, theft of sensitive employee data, and further system compromise.
Vulnerability
The vulnerability is a stored Cross-Site Scripting (XSS) flaw within the ticket comment editor. The application fails to properly sanitize user-supplied input when a comment is submitted, allowing malicious scripts to be saved to the database. An authenticated attacker with low-level privileges can craft a comment containing a malicious payload (e.g., JavaScript) and post it to a support ticket. When another user, particularly an administrator, views this ticket, the malicious script executes within the context of their browser session, enabling the attacker to steal session cookies, perform unauthorized actions on their behalf, or redirect them to malicious websites.
Business impact
This vulnerability is rated as critical with a CVSS score of 9.9, posing a severe risk to the organization. Successful exploitation could lead to the compromise of highly sensitive employee data managed by the HRMS, including Personally Identifiable Information (PII), salary details, and confidential performance reviews. An attacker could escalate their privileges to an administrator level, resulting in complete control over the HR system, enabling data exfiltration, payroll fraud, and causing significant reputational damage and regulatory compliance issues.
Remediation
Immediate Action: Organizations must immediately upgrade all instances of the Horilla Human Resource Management System to version 1.4.0 or later, as recommended by the vendor. Following the update, review system and access logs for any evidence of suspicious activity, such as unusual comments in tickets or unexpected administrative actions, to identify potential prior exploitation.
Proactive Monitoring:
Security teams should monitor application logs for submissions to the ticket comment editor that contain script tags (e.g., <script>, <img>, <iframe>) or JavaScript event handlers (e.g., onerror, onload). Implement or enhance Web Application Firewall (WAF) rules to detect and block common XSS attack patterns. Monitor for unusual session activity or privilege escalation attempts within the application.
Compensating Controls: If patching is not immediately possible, implement a Web Application Firewall (WAF) with strict XSS filtering rules as a temporary mitigation. Enforce a strong Content Security Policy (CSP) on the web server to restrict the execution of inline scripts. Limit access to the ticketing module to only essential personnel to reduce the attack surface.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical CVSS score of 9.9 and the potential for a low-privilege attacker to gain complete control over the HRMS, this vulnerability requires immediate remediation. We strongly recommend all organizations using affected versions of Horilla to apply the security update provided by the vendor as a top priority. The risk of sensitive data exposure and system compromise is severe, and this patching effort should be prioritized over routine maintenance.