First published: Fri Feb 07 2025(Updated: )
Insufficient data authenticity verification vulnerability in Janto, versions prior to r12. This allows an unauthenticated attacker to modify the content of emails sent to reset the password. To exploit the vulnerability, the attacker must create a POST request by injecting malicious content into the ‘Xml’ parameter on the ‘/public/cgi/Gateway.php’ endpoint.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
Janto | <r12 |
With the implemented patches by the Impronta team, the detected vulnerabilities have been fixed. All customers using this product in SaaS mode have been upgraded to version r12 which fixes these issues.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1108 is classified as a medium severity vulnerability due to its ability to allow unauthorized content modification in password reset emails.
To fix CVE-2025-1108, upgrade Janto to version r12 or later where this vulnerability is addressed.
CVE-2025-1108 affects all versions of Janto prior to r12, allowing attackers to exploit email content.
CVE-2025-1108 enables unauthorized attackers to modify content in password reset emails through insufficient data authenticity verification.
Yes, CVE-2025-1108 can be exploited by unauthenticated attackers, making it particularly concerning.