OrangeHRM is Vulnerable to Improper Authorization Allowing Unauthorized Access to Interview Attachments
Description
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/orangehrm/orangehrm/commit/647133d0fdda989a4836845a6531277078a84607mitrex_refsource_MISC
- github.com/orangehrm/orangehrm/security/advisories/GHSA-v32g-r8xx-4g6gmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.