No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Stratonwebdesigners
Stratonwebdesigners hireflow |
|
| Vendors & Products |
Stratonwebdesigners
Stratonwebdesigners hireflow |
Mon, 11 May 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Incorrect Access Control in HireFlow 1.2 Enables Unauthorized Data Access | |
| Weaknesses | CWE-284 |
Mon, 11 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-639 | |
| Metrics |
cvssV3_1
|
Mon, 11 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Incorrect Access Control in HireFlow 1.2 Enables Unauthorized Data Access | |
| Weaknesses | CWE-284 |
Mon, 11 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HireFlow v1.2 is vulnerable to Incorrect Access Control. The application does not enforce object-level authorization on the /candidate/<id> and /interview/<id> endpoints. The route handlers retrieve records by the user-supplied ID without verifying that the requesting user is the owner or has an authorized role. Any authenticated user can access any other user's candidate profiles and interview notes by iterating the integer ID in the URL path, constituting a horizontal privilege escalation and full data breach of all records in the system. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-11T18:21:13.741Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-38568
Updated: 2026-05-11T18:21:00.258Z
Status : Received
Published: 2026-05-11T18:16:32.970
Modified: 2026-05-11T19:16:21.903
Link: CVE-2026-38568
No data.
OpenCVE Enrichment
Updated: 2026-05-12T09:23:28Z