CVE-2026-39349
Received Received - Intake
AES-ECB Encryption Weakness in OrangeHRM 5.0–5.8 Exposes Data Patterns

Publication date: 2026-04-07

Last updated on: 2026-04-10

Assigner: GitHub, Inc.

Description
OrangeHRM is a comprehensive human resource management (HRM) system. From 5.0 to 5.8, OrangeHRM Open Source encrypts certain sensitive fields with AES in ECB mode, which preserves block-aligned plaintext patterns in ciphertext and enables pattern disclosure against stored data. This vulnerability is fixed in 5.8.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-10
Generated
2026-05-07
AI Q&A
2026-04-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
orangehrm orangehrm From 5.0 (inc) to 5.8.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-326 The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability involves the use of AES encryption in ECB mode for certain sensitive fields, which allows pattern disclosure and potential exposure of sensitive information. This could impact the confidentiality of personal or sensitive data stored within OrangeHRM systems.

Since GDPR, HIPAA, and similar regulations require adequate protection of sensitive data to prevent unauthorized disclosure, the use of insecure encryption methods like AES-ECB may lead to non-compliance with these standards.

However, the vulnerability has a low severity impact on confidentiality and requires high privileges to exploit, which may limit the practical risk. The issue was fixed in version 5.8.1 by replacing AES-ECB with a more secure encryption method, improving compliance posture.


Can you explain this vulnerability to me?

CVE-2026-39349 is a vulnerability in OrangeHRM Open Source versions 5.0 to 5.8 where certain sensitive data fields are encrypted using AES in ECB (Electronic Codebook) mode.

AES-ECB mode is insecure because it preserves patterns in plaintext blocks within the ciphertext, allowing attackers to detect and disclose data patterns, potentially revealing sensitive information.

This vulnerability was fixed in version 5.8.1 by replacing AES-ECB encryption with a more secure method to prevent pattern disclosure.


How can this vulnerability impact me? :

This vulnerability can lead to limited disclosure of sensitive information because the encryption method used (AES-ECB) preserves data patterns, which attackers with high privileges can exploit remotely.

However, the impact is considered low severity with a CVSS v4 base score of 2.1, requiring an attacker to have high privileges and overcome complex conditions to exploit it.

The vulnerability does not affect data integrity or system availability.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves the use of AES encryption in ECB mode for certain sensitive fields in OrangeHRM Open Source versions 5.0 to 5.8. Detection would involve identifying if your system is running a vulnerable version of OrangeHRM and if sensitive data is encrypted using AES-ECB mode.

Since the vulnerability requires high privileges to exploit and is related to encryption mode, detection on the network level is challenging because no direct exploit traffic is described.

To detect the vulnerability on your system, you can:

  • Check the installed OrangeHRM version to see if it is between 5.0 and 5.8 (inclusive).
  • Review configuration files or source code to identify if AES encryption is used in ECB mode for sensitive fields.
  • Use commands to check the version, for example:
  • grep -i version /path/to/orangehrm/version or similar commands depending on your installation.
  • Inspect database fields or encrypted data patterns that might reveal ECB mode encryption characteristics (e.g., repeated ciphertext blocks).

No specific detection commands or network signatures are provided in the available information.


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade OrangeHRM Open Source to version 5.8.1 or later, where the vulnerability is fixed by replacing AES-ECB encryption with a more secure method.

Since the vulnerability requires high privileges to exploit and has low severity, immediate mitigation involves:

  • Applying the official patch or upgrading to OrangeHRM 5.8.1.
  • Restricting high privilege access to the system to reduce the risk of exploitation.
  • Reviewing encryption configurations to ensure sensitive data is not encrypted using AES in ECB mode.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart