CVE-2026-38569
Received Received - Intake
Cross-Site Scripting (XSS) in HireFlow via Resume or Feedback

Publication date: 2026-05-11

Last updated on: 2026-05-11

Assigner: MITRE

Description
HireFlow v1.2 is vulnerable to Cross Site Scripting (XSS) in candidate_detail.html via the Resume or Feedback Comment fields via POST /candidates/add or POST /feedback/add.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-11
Last Modified
2026-05-11
Generated
2026-05-11
AI Q&A
2026-05-11
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
stratonwebdesigners hireflow 1.2
stratonwebdesigners hireflow From 1.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-38569 is a vulnerability in HireFlow Interview Management System v1.2 that allows unauthorized access to candidate profiles and interview notes. The issue arises from a lack of proper access control checks on the /candidate/<id> and /interview/<id> endpoints, specifically in the candidate_detail() and interview_detail() functions. An authenticated user can manipulate the integer ID in the URL to view other users' data, leading to horizontal privilege escalation and a full data breach.

This vulnerability can be exploited simply by editing the URL in a browser without needing special tools.

The root cause is missing ownership verification and role-based access control, which should be implemented to restrict access to only authorized users.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to all candidate profiles and interview records within the HireFlow system.

  • Exposure of sensitive personal information of candidates.
  • Potential data breaches affecting the confidentiality of recruitment data.
  • Loss of trust from candidates and stakeholders due to compromised data privacy.
  • Possible legal and reputational consequences for organizations using the affected software.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to access candidate profiles or interview notes by manipulating the integer ID in the URL endpoints /candidate/<id> and /interview/<id>. If unauthorized access to other users' data is possible by simply changing the ID in the URL, the system is vulnerable.

A practical way to detect this is to log in as a normal user and try to access URLs with different candidate or interview IDs to see if data belonging to other users is accessible.

Since the vulnerability involves web endpoints, commands using tools like curl or browser-based testing can be used. For example:

  • curl -i -X GET -b 'session_cookie=your_session_cookie' https://your-hireflow-domain/candidate/2
  • curl -i -X GET -b 'session_cookie=your_session_cookie' https://your-hireflow-domain/interview/3

Replace the session cookie with a valid authenticated user's session and change the ID to test access to other users' data. If data is returned for IDs not belonging to the authenticated user, the vulnerability exists.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to candidate and interview details by implementing ownership checks to verify that the requesting user owns the record they are trying to access.

Additionally, implement role-based access control (RBAC) to ensure only authorized users, such as admins, can access all candidate profiles and interview notes.

Until a patch is applied, limit user permissions and monitor access logs for suspicious activity involving URL manipulation.

Upgrade to HireFlow version 1.3 or later, where the vendor has provided a patch that adds the necessary ownership checks and RBAC.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in HireFlow v1.2 allows unauthorized access to candidate profiles and interview records due to lack of proper access control and object-level authorization checks. This leads to a potential full data breach of sensitive personal information.

Such unauthorized access and data breaches can negatively impact compliance with common data protection standards and regulations like GDPR and HIPAA, which require strict controls over personal and sensitive data to ensure confidentiality, integrity, and proper access management.

Failure to implement adequate access controls and protect candidate data could result in violations of these regulations, potentially leading to legal penalties, reputational damage, and loss of trust.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart