{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T19:58:48.072","vulnerabilities":[{"cve":{"id":"CVE-2025-1108","sourceIdentifier":"cve-coordination@incibe.es","published":"2025-02-07T14:15:48.530","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Insufficient data authenticity verification vulnerability in Janto, versions prior to r12. This allows an unauthenticated attacker to modify the content of emails sent to reset the password. To exploit the vulnerability, the attacker must create a POST request by injecting malicious content into the ‘Xml’ parameter on the ‘/public/cgi/Gateway.php’ endpoint."},{"lang":"es","value":"Vulnerabilidad de verificación insuficiente de la autenticidad de los datos en Janto, versiones anteriores a r12. Esto permite que un atacante no autenticado modifique el contenido de los correos electrónicos enviados para restablecer la contraseña. Para explotar la vulnerabilidad, el atacante debe crear una solicitud POST inyectando contenido malicioso en el parámetro 'Xml' en el endpoint '/public/cgi/Gateway.php'."}],"metrics":{"cvssMetricV31":[{"source":"cve-coordination@incibe.es","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.0}]},"weaknesses":[{"source":"cve-coordination@incibe.es","type":"Secondary","description":[{"lang":"en","value":"CWE-345"}]}],"references":[{"url":"https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janto","source":"cve-coordination@incibe.es"}]}}]}