CVE-2025-1108
Published: 07 February 2025
Description
Insufficient data authenticity verification vulnerability in Janto, versions prior to r12. This allows an unauthenticated attacker to modify the content of emails sent to reset the password. To exploit the vulnerability, the attacker must create a POST request by injecting malicious content into the ‘Xml’ parameter on the ‘/public/cgi/Gateway.php’ endpoint.
Security Summary
CVE-2025-1108 is an insufficient data authenticity verification vulnerability, classified under CWE-345, affecting Janto versions prior to r12. Published on 2025-02-07, it carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N). The flaw enables modification of password reset email content due to inadequate verification of data authenticity in the affected component.
An unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. By crafting a POST request to the /public/cgi/Gateway.php endpoint and injecting malicious content into the 'Xml' parameter, the attacker can alter the content of emails sent for password resets, achieving high integrity impact in a scoped attack scenario.
Mitigation details are available in the INCIBE-CERT advisory on multiple vulnerabilities in Janto at https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janto.
Details
- CWE(s)