CVE-2026-38568
Received Received - Intake
Incorrect Access Control in HireFlow v1.2

Publication date: 2026-05-11

Last updated on: 2026-05-11

Assigner: MITRE

Description
HireFlow v1.2 is vulnerable to Incorrect Access Control. The application does not enforce object-level authorization on the /candidate/<id> and /interview/<id> endpoints. The route handlers retrieve records by the user-supplied ID without verifying that the requesting user is the owner or has an authorized role. Any authenticated user can access any other user's candidate profiles and interview notes by iterating the integer ID in the URL path, constituting a horizontal privilege escalation and full data breach of all records in the system.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-11
Last Modified
2026-05-11
Generated
2026-05-11
AI Q&A
2026-05-11
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
hireflow hireflow 1.2
stratonwebdesigners hireflow to 1.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-38568 is an Incorrect Access Control vulnerability in HireFlow Interview Management System v1.2. The application fails to enforce proper authorization checks on the /candidate/<id> and /interview/<id> endpoints. This means that any authenticated user can access candidate profiles and interview notes belonging to other users by simply changing the integer ID in the URL.

Because the IDs are sequential and start from 1, an attacker does not need to guess or brute force IDs to access unauthorized data. This results in horizontal privilege escalation and a full data breach of all records in the system.


How can this vulnerability impact me? :

This vulnerability allows any authenticated user to access sensitive data of other users without authorization. This includes candidate profiles and interview notes, which may contain personal and confidential information.

The impact is a complete data breach of all records in the system, leading to loss of confidentiality and potential misuse of sensitive information.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to access candidate profiles or interview notes of other users by manipulating the integer ID in the URL path while authenticated.

For example, an authenticated user can try accessing endpoints like /candidate/1 or /interview/2 and then increment or decrement the ID to see if unauthorized data is accessible.

Commands or methods to detect this include using tools like curl or a web browser to manually test URL paths with different IDs.

  • curl -i -H "Authorization: Bearer <token>" https://<hireflow-domain>/candidate/1
  • curl -i -H "Authorization: Bearer <token>" https://<hireflow-domain>/candidate/2
  • curl -i -H "Authorization: Bearer <token>" https://<hireflow-domain>/interview/1
  • curl -i -H "Authorization: Bearer <token>" https://<hireflow-domain>/interview/2

If these requests return data for IDs that do not belong to the authenticated user, it confirms the presence of the vulnerability.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing ownership verification checks in the candidate_detail() and interview_detail() functions to ensure that the record's owner_id matches the current user's ID.

If the user is not authorized to access the record, the system should return an HTTP 403 Forbidden response.

Additionally, implementing role-based access control (RBAC) to restrict access to admin-level users can help prevent unauthorized data access.

Upgrading to HireFlow version 1.3, which includes a patch for this vulnerability, is strongly recommended.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows any authenticated user to access sensitive personal data of other users without proper authorization, resulting in a full data breach of all records in the system.

Such unauthorized access and data breaches can lead to non-compliance with common data protection standards and regulations like GDPR and HIPAA, which require strict access controls and protection of personal and sensitive information.

Failure to enforce object-level authorization and prevent horizontal privilege escalation increases the risk of violating these regulations, potentially resulting in legal penalties, reputational damage, and loss of user trust.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart