Metrics
Affected Vendors & Products
Solution
With the implemented patches by the Impronta team, the detected vulnerabilities have been fixed. All customers using this product in SaaS mode have been upgraded to version r12 which fixes these issues.
Workaround
No workaround given by the vendor.
Wed, 12 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 07 Feb 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Insufficient data authenticity verification vulnerability in Janto, versions prior to r12. This allows an unauthenticated attacker to modify the content of emails sent to reset the password. To exploit the vulnerability, the attacker must create a POST request by injecting malicious content into the ‘Xml’ parameter on the ‘/public/cgi/Gateway.php’ endpoint. | |
Title | Insufficient data authenticity vulnerability in Janto | |
Weaknesses | CWE-345 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-02-12T20:51:40.433Z
Reserved: 2025-02-07T12:01:52.466Z
Link: CVE-2025-1108

Updated: 2025-02-12T20:46:06.822Z

Status : Received
Published: 2025-02-07T14:15:48.530
Modified: 2025-02-07T14:15:48.530
Link: CVE-2025-1108

No data.

No data.