CVE-2025-48867

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-48867
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-48867.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-48867
Aliases
  • GHSA-w242-xv47-j55r
Published
2025-09-24T17:25:42.227Z
Modified
2025-12-02T20:07:20.239130Z
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
Horilla Stored Cross-Site Scripting (XSS) Vulnerability in Project and Task Modules
Details

Horilla is a free and open source Human Resource Management System (HRMS). A stored cross-site scripting (XSS) vulnerability in Horilla HRM 1.3.0 allows authenticated admin or privileged users to inject malicious JavaScript payloads into multiple fields in the Project and Task modules. These payloads persist in the database and are executed when viewed by an admin or other privileged users through the web interface. Although the issue is not exploitable by unauthenticated users, it still poses a high risk of session hijacking and unauthorized action within high-privilege accounts. At time of publication there is no known patch.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-79"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/48xxx/CVE-2025-48867.json"
}
References

Affected packages

Git / github.com/horilla-opensource/horilla

Affected ranges

Type
GIT
Repo
https://github.com/horilla-opensource/horilla
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.0.0
1.1.0
1.2.0
1.2.1
1.2.2
1.2.3
1.3