CVE-2026-38566
Summary
| CVE | CVE-2026-38566 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-11 18:16:32 UTC |
| Updated | 2026-05-11 18:16:32 UTC |
| Description | HireFlow v1.2 does not implement CSRF token validation on any state-changing POST endpoint. All forms (password change at /profile, candidate deletion at /candidates/delete/<id>, feedback submission at /feedback/add/<id>, interview scheduling at /interviews/add) are vulnerable to CSRF. An attacker who can trick an authenticated user into visiting a malicious page can silently change the victim's password, delete records, or inject arbitrary data on their behalf. The SESSION_COOKIE_SAMESITE attribute is also not configured, removing the browser-level CSRF defense. |
Risk And Classification
Problem Types: n/a
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| github.com/StratonWebDesigners/HireFlow | [email protected] | github.com | |
| github.com/hijackedamygdala/CVE-Disclosures/tree/main/HireFlow/CVE-2026-... | [email protected] | github.com | |
| www.sourcecodester.com/python/18688/hireflow-%E2%80%93-complete-interview-management... | [email protected] | www.sourcecodester.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.