Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 08 Oct 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A weakness has been identified in JhumanJ OpnForm up to 1.9.3. This affects an unknown function of the file /api/password/email of the component Forgotten Password Handler. This manipulation causes information exposure through discrepancy. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be exploited. This issue is currently aligned with Laravel issue #46465, which is why no mitigation action was taken. | |
Title | JhumanJ OpnForm Forgotten Password email information exposure | |
Weaknesses | CWE-200 CWE-203 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-08T13:16:46.766Z
Reserved: 2025-10-07T13:17:33.700Z
Link: CVE-2025-11443

Updated: 2025-10-08T13:16:26.188Z

Status : Awaiting Analysis
Published: 2025-10-08T08:15:32.697
Modified: 2025-10-08T19:38:09.863
Link: CVE-2025-11443

No data.

No data.