Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 08 Oct 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A security flaw has been discovered in JhumanJ OpnForm up to 1.9.3. The impacted element is an unknown function of the component API Endpoint. The manipulation results in cross-site request forgery. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor has stated that API calls require authentication through Authorization Bearer Tokens, so classic CSRF attacks do not apply here. An attacker would need to possess the JWT through means such as XSS which were mitigated, disabling any form of initial access. | |
Title | JhumanJ OpnForm API Endpoint cross-site request forgery | |
Weaknesses | CWE-352 CWE-862 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-08T13:19:45.546Z
Reserved: 2025-10-07T13:17:31.034Z
Link: CVE-2025-11442

Updated: 2025-10-08T13:19:34.332Z

Status : Awaiting Analysis
Published: 2025-10-08T08:15:32.000
Modified: 2025-10-08T19:38:09.863
Link: CVE-2025-11442

No data.

No data.