Metrics
Affected Vendors & Products
Thu, 09 Oct 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:jhumanj:opnform:*:*:*:*:*:*:*:* |
Thu, 09 Oct 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jhumanj
Jhumanj opnform |
|
| Vendors & Products |
Jhumanj
Jhumanj opnform |
Wed, 08 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Oct 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in JhumanJ OpnForm up to 1.9.3. The impacted element is an unknown function of the component API Endpoint. The manipulation results in cross-site request forgery. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor has stated that API calls require authentication through Authorization Bearer Tokens, so classic CSRF attacks do not apply here. An attacker would need to possess the JWT through means such as XSS which were mitigated, disabling any form of initial access. | |
| Title | JhumanJ OpnForm API Endpoint cross-site request forgery | |
| Weaknesses | CWE-352 CWE-862 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-10-08T07:32:05.380Z
Updated: 2025-10-08T13:19:45.546Z
Reserved: 2025-10-07T13:17:31.034Z
Link: CVE-2025-11442
Updated: 2025-10-08T13:19:34.332Z
Status : Analyzed
Published: 2025-10-08T08:15:32.000
Modified: 2025-10-09T16:15:49.933
Link: CVE-2025-11442
No data.