CVE-2026-39348
Received Received - Intake
Authorization Bypass in OrangeHRM Attachments Allows Data Exposure

Publication date: 2026-04-07

Last updated on: 2026-04-10

Assigner: GitHub, Inc.

Description
OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to 5.8, OrangeHRM Open Source omits authorization on job specification and vacancy attachment download handlers, allowing authenticated low-privilege users to read attachments via direct reference to attachment identifiers. This vulnerability is fixed in 5.8.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-10
Generated
2026-05-07
AI Q&A
2026-04-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
orangehrm orangehrm From 5.0 (inc) to 5.8.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthorized disclosure of job specification and vacancy attachments by authenticated low-privilege users due to missing authorization checks. Although the confidentiality impact is rated as low, the exposure of potentially sensitive job-related information could have implications for compliance with data protection regulations such as GDPR or HIPAA, which require proper access controls to protect personal and sensitive data.

Organizations using affected versions of OrangeHRM Open Source (5.0 to 5.8) should consider this vulnerability as a risk to confidentiality and ensure they upgrade to version 5.8.1 or later to maintain compliance with standards that mandate strict authorization and data protection measures.


Can you explain this vulnerability to me?

CVE-2026-39348 is a vulnerability in OrangeHRM Open Source versions 5.0 through 5.8 where authorization checks are missing in the job specification and vacancy attachment download handlers.

This means that authenticated users with low privileges can access and download job-related attachments by directly referencing attachment identifiers, bypassing the intended access controls.

The vulnerability is due to missing authorization enforcement in subclasses of the AbstractFileController, specifically in the file download handlers.

It was fixed in version 5.8.1.


How can this vulnerability impact me? :

This vulnerability allows unauthorized disclosure of job specification and vacancy attachments, potentially exposing confidential job-related information to low-privilege authenticated users.

The confidentiality impact is rated as low, and there is no impact on system integrity or availability.

An attacker can exploit this remotely without any special conditions or user interaction.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by verifying if unauthorized access to job specification and vacancy attachments is possible by authenticated low-privilege users. Specifically, testing whether attachments can be downloaded by directly referencing attachment identifiers without proper authorization checks is key.

To detect this on your system, you can attempt to access attachment download URLs with a low-privilege authenticated user account and observe if the attachments are accessible.

Example commands might include using curl or wget with authenticated session cookies or tokens to request attachment URLs directly, such as:

  • curl -b cookies.txt https://your-orangehrm-instance.com/download/attachment?id=ATTACHMENT_ID
  • wget --load-cookies cookies.txt https://your-orangehrm-instance.com/download/attachment?id=ATTACHMENT_ID

Replace ATTACHMENT_ID with actual attachment identifiers and ensure the session corresponds to a low-privilege user. If the attachments are accessible without authorization errors, the system is vulnerable.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade OrangeHRM Open Source to version 5.8.1 or later, where this vulnerability has been fixed by adding proper authorization checks.

Until the upgrade can be performed, restrict access to the attachment download handlers to only trusted users or implement additional access controls at the network or application level to prevent unauthorized attachment downloads.

Additionally, monitor and audit access logs for suspicious attachment download attempts by low-privilege users.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart