VYPR
Low severity3.5NVD Advisory· Published Jan 19, 2026· Updated Apr 29, 2026

CVE-2026-1161

CVE-2026-1161

Description

A vulnerability was detected in pbrong hrms 1.0.1. The affected element is the function UpdateRecruitmentById of the file /handler/recruitment.go. The manipulation results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Pbrong hrms 1.0.1 contains a stored XSS vulnerability in the UpdateRecruitmentById function due to insufficient input sanitization.

Vulnerability

Analysis

CVE-2026-1161 describes a stored cross-site scripting (XSS) vulnerability in pbrong hrms version 1.0.1. The flaw resides in the UpdateRecruitmentById function within the file /handler/recruitment.go. The application fails to sanitize user-supplied input before storing it in the database, allowing an attacker to inject malicious JavaScript code [1].

Exploitation

An attacker can exploit this vulnerability by entering crafted data through the recruitment management interface. The input is passed to UpdateRecruitmentById, which then stores it in the database without adequate filtering. Subsequently, when another endpoint, GetRecruitmentByJobName, retrieves and displays this stored data without sanitization, causing the injected script to execute in the browser of any user viewing the recruitment information [1]. The attack can be performed remotely and does not require elevated privileges, though some authenticated access may be needed to the recruitment feature may be needed.

Impact

Successful exploitation allows an attacker to stored XSS allows an attacker to execute arbitrary JavaScript in the context of a victim's session. This can lead to theft of session cookies, redirection to malicious sites, or defacement of the application. The public availability of exploit details increases the risk of widespread attacks [1].

Mitigation

As of the publication date, the vendor has not released a patched version. It is recommended to apply input validation and output encoding for all user-supplied data, especially in the recruitment update functionality. Until a fix is available, consider disabling the affected functionality or using a Web Application Firewall (WAF) to detect and block XSS payloads [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.