A weakness has been identified in JhumanJ OpnForm up to 1.9.3. This affects an unknown function of the file /api/password/email of the component Forgotten Password Handler. This manipulation causes information exposure through discrepancy. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be exploited. This issue is currently aligned with Laravel issue #46465, which is why no mitigation action was taken.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Oct 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A weakness has been identified in JhumanJ OpnForm up to 1.9.3. This affects an unknown function of the file /api/password/email of the component Forgotten Password Handler. This manipulation causes information exposure through discrepancy. It is possible to initiate the attack remotely. The attack is considered to have high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be exploited. This issue is currently aligned with Laravel issue #46465, which is why no mitigation action was taken. | |
Title | JhumanJ OpnForm Forgotten Password email information exposure | |
Weaknesses | CWE-200 CWE-203 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-10-08T07:32:07.900Z
Reserved: 2025-10-07T13:17:33.700Z
Link: CVE-2025-11443

No data.

Status : Received
Published: 2025-10-08T08:15:32.697
Modified: 2025-10-08T08:15:32.697
Link: CVE-2025-11443

No data.

No data.