Security for everyone

CVE-2023-26469 Scanner

Detects 'Path Traversal' vulnerability in Jorani affects v. 1.0.0.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2023-26469 Scanner Detail

Jorani is a human resources management software used by organizations to manage leaves, overtime, and attendance. The software can be installed on a server and accessed through a web browser. It is a widely used software due to its user-friendly interface and comprehensive features. However, with its popularity comes the risk of cyber attacks, and a vulnerability was detected in Jorani, known as CVE-2023-26469.

The vulnerability, CVE-2023-26469, is a path traversal vulnerability that allows an attacker to access files and execute code on the server. Specifically, it enables an attacker to bypass access controls and read sensitive data from the server. By traversing through file paths, an attacker can access files that were meant to be restricted, and use them for their own purposes.

Exploiting this vulnerability can lead to serious consequences for organizations. Attackers can gain access to sensitive employee data, including personal information, salary details, and confidential corporate data. This can result in financial loss, loss of reputation, and legal issues. The impact of such attacks can be particularly severe for small and medium-sized organizations that do not have the resources to recover from these losses.

Thanks to the pro features of the platform, identifying and addressing vulnerabilities in digital assets like Jorani has never been easier. Organizations can use the platform to scan their websites for vulnerabilities, receive alerts for new threats, and stay informed on the latest security news. By taking proactive steps to protect against cyber attacks, organizations ensure the safety and security of their digital assets, and safeguard their reputation and finances.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture