A security flaw has been discovered in JhumanJ OpnForm up to 1.9.3. The impacted element is an unknown function of the component API Endpoint. The manipulation results in cross-site request forgery. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor has stated that API calls require authentication through Authorization Bearer Tokens, so classic CSRF attacks do not apply here. An attacker would need to possess the JWT through means such as XSS which were mitigated, disabling any form of initial access.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Oct 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A security flaw has been discovered in JhumanJ OpnForm up to 1.9.3. The impacted element is an unknown function of the component API Endpoint. The manipulation results in cross-site request forgery. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor has stated that API calls require authentication through Authorization Bearer Tokens, so classic CSRF attacks do not apply here. An attacker would need to possess the JWT through means such as XSS which were mitigated, disabling any form of initial access. | |
Title | JhumanJ OpnForm API Endpoint cross-site request forgery | |
Weaknesses | CWE-352 CWE-862 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-08T07:32:05.380Z
Reserved: 2025-10-07T13:17:31.034Z
Link: CVE-2025-11442

No data.

Status : Received
Published: 2025-10-08T08:15:32.000
Modified: 2025-10-08T08:15:32.000
Link: CVE-2025-11442

No data.

No data.