Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.1

Horilla-opensource Horilla: Leads Module Can Be Tricked into Running Malicious Code

CVE-2026-3050
Summary

An attacker can exploit a weakness in the Leads Module of Horilla-opensource Horilla, potentially allowing them to inject malicious code into user browsers. This can happen when a user interacts with a specially crafted webpage. To fix the issue, we recommend updating to version 1.0.3 of Horilla-opensource Horilla.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
horilla horilla <= 1.0.3 –
Original title
A flaw has been found in horilla-opensource horilla up to 1.0.2. Impacted is an unknown function of the file static/assets/js/global.js of the component Leads Module. This manipulation of the argum...
Original description
A flaw has been found in horilla-opensource horilla up to 1.0.2. Impacted is an unknown function of the file static/assets/js/global.js of the component Leads Module. This manipulation of the argument Notes causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. Upgrading to version 1.0.3 is recommended to address this issue. Patch name: fc5c8e55988e89273012491b5f097b762b474546. It is suggested to upgrade the affected component.
nvd CVSS2.0 4.0
nvd CVSS3.1 5.4
nvd CVSS4.0 5.1
Vulnerability type
CWE-79 Cross-site Scripting (XSS)
CWE-94 Code Injection
Published: 24 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026