Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:jhumanj:opnform:*:*:*:*:*:*:*:* |
Thu, 09 Oct 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jhumanj
Jhumanj opnform |
|
| Vendors & Products |
Jhumanj
Jhumanj opnform |
Wed, 08 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Oct 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in JhumanJ OpnForm up to 1.9.3. This affects an unknown function of the file /api/password/email of the component Forgotten Password Handler. This manipulation causes information exposure through discrepancy. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be exploited. This issue is currently aligned with Laravel issue #46465, which is why no mitigation action was taken. | |
| Title | JhumanJ OpnForm Forgotten Password email information exposure | |
| Weaknesses | CWE-200 CWE-203 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-08T13:16:46.766Z
Reserved: 2025-10-07T13:17:33.700Z
Link: CVE-2025-11443
Updated: 2025-10-08T13:16:26.188Z
Status : Analyzed
Published: 2025-10-08T08:15:32.697
Modified: 2025-10-09T16:14:51.700
Link: CVE-2025-11443
No data.
OpenCVE Enrichment
Updated: 2025-10-09T12:51:48Z