Metrics
Affected Vendors & Products
Thu, 09 Oct 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:jhumanj:opnform:*:*:*:*:*:*:*:* |
Thu, 09 Oct 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jhumanj
Jhumanj opnform |
|
Vendors & Products |
Jhumanj
Jhumanj opnform |
Wed, 08 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 08 Oct 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A security flaw has been discovered in JhumanJ OpnForm up to 1.9.3. The impacted element is an unknown function of the component API Endpoint. The manipulation results in cross-site request forgery. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor has stated that API calls require authentication through Authorization Bearer Tokens, so classic CSRF attacks do not apply here. An attacker would need to possess the JWT through means such as XSS which were mitigated, disabling any form of initial access. | |
Title | JhumanJ OpnForm API Endpoint cross-site request forgery | |
Weaknesses | CWE-352 CWE-862 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-08T13:19:45.546Z
Reserved: 2025-10-07T13:17:31.034Z
Link: CVE-2025-11442

Updated: 2025-10-08T13:19:34.332Z

Status : Analyzed
Published: 2025-10-08T08:15:32.000
Modified: 2025-10-09T16:15:49.933
Link: CVE-2025-11442

No data.