CVE-2026-38569
Cross-Site Scripting (XSS) in HireFlow via Resume or Feedback
Publication date: 2026-05-11
Last updated on: 2026-05-11
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| stratonwebdesigners | hireflow | 1.2 |
| stratonwebdesigners | hireflow | From 1.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-38569 is a vulnerability in HireFlow Interview Management System v1.2 that allows unauthorized access to candidate profiles and interview notes. The issue arises from a lack of proper access control checks on the /candidate/<id> and /interview/<id> endpoints, specifically in the candidate_detail() and interview_detail() functions. An authenticated user can manipulate the integer ID in the URL to view other users' data, leading to horizontal privilege escalation and a full data breach.
This vulnerability can be exploited simply by editing the URL in a browser without needing special tools.
The root cause is missing ownership verification and role-based access control, which should be implemented to restrict access to only authorized users.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized access to all candidate profiles and interview records within the HireFlow system.
- Exposure of sensitive personal information of candidates.
- Potential data breaches affecting the confidentiality of recruitment data.
- Loss of trust from candidates and stakeholders due to compromised data privacy.
- Possible legal and reputational consequences for organizations using the affected software.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to access candidate profiles or interview notes by manipulating the integer ID in the URL endpoints /candidate/<id> and /interview/<id>. If unauthorized access to other users' data is possible by simply changing the ID in the URL, the system is vulnerable.
A practical way to detect this is to log in as a normal user and try to access URLs with different candidate or interview IDs to see if data belonging to other users is accessible.
Since the vulnerability involves web endpoints, commands using tools like curl or browser-based testing can be used. For example:
- curl -i -X GET -b 'session_cookie=your_session_cookie' https://your-hireflow-domain/candidate/2
- curl -i -X GET -b 'session_cookie=your_session_cookie' https://your-hireflow-domain/interview/3
Replace the session cookie with a valid authenticated user's session and change the ID to test access to other users' data. If data is returned for IDs not belonging to the authenticated user, the vulnerability exists.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to candidate and interview details by implementing ownership checks to verify that the requesting user owns the record they are trying to access.
Additionally, implement role-based access control (RBAC) to ensure only authorized users, such as admins, can access all candidate profiles and interview notes.
Until a patch is applied, limit user permissions and monitor access logs for suspicious activity involving URL manipulation.
Upgrade to HireFlow version 1.3 or later, where the vendor has provided a patch that adds the necessary ownership checks and RBAC.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in HireFlow v1.2 allows unauthorized access to candidate profiles and interview records due to lack of proper access control and object-level authorization checks. This leads to a potential full data breach of sensitive personal information.
Such unauthorized access and data breaches can negatively impact compliance with common data protection standards and regulations like GDPR and HIPAA, which require strict controls over personal and sensitive data to ensure confidentiality, integrity, and proper access management.
Failure to implement adequate access controls and protect candidate data could result in violations of these regulations, potentially leading to legal penalties, reputational damage, and loss of trust.