| Summary | HireFlow v1.2 does not implement CSRF token validation on any state-changing POST endpoint. All forms (password change at /profile, candidate deletion at /candidates/delete/<id>, feedback submission at /feedback/add/<id>, interview scheduling at /interviews/add) are vulnerable to CSRF. An attacker who can trick an authenticated user into visiting a malicious page can silently change the victim's password, delete records, or inject arbitrary data on their behalf. The SESSION_COOKIE_SAMESITE attribute is also not configured, removing the browser-level CSRF defense. |
|---|---|
| Publication Date | May 12, 2026, 3:16 a.m. |
| Registration Date | May 12, 2026, 4:14 a.m. |
| Last Update | May 12, 2026, 3:16 a.m. |