HireFlow v1.2 is vulnerable to SQL injection in the /login and /search endpoints. User-supplied input is concatenated directly into SQL queries without parameterization. An unauthenticated attacker can bypass authentication by supplying a crafted username (e.g. admin'--) or extract the full contents of the database including user credentials via UNION-based injection at the /search endpoint.
History

Tue, 12 May 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Stratonwebdesigners
Stratonwebdesigners hireflow
Vendors & Products Stratonwebdesigners
Stratonwebdesigners hireflow

Mon, 11 May 2026 18:45:00 +0000

Type Values Removed Values Added
Title SQL Injection in HireFlow v1.2 Enables unauthenticated access and credential theft
Weaknesses CWE-89

Mon, 11 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description HireFlow v1.2 is vulnerable to SQL injection in the /login and /search endpoints. User-supplied input is concatenated directly into SQL queries without parameterization. An unauthenticated attacker can bypass authentication by supplying a crafted username (e.g. admin'--) or extract the full contents of the database including user credentials via UNION-based injection at the /search endpoint.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-05-11T00:00:00.000Z

Updated: 2026-05-11T16:35:27.162Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-38567

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-11T18:16:32.857

Modified: 2026-05-11T18:16:32.857

Link: CVE-2026-38567

cve-icon Redhat

No data.