CVE-2025-11436
BaseFortify
Publication date: 2025-10-08
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| jhumanj | opnform | to 1.9.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in JhumanJ OpnForm up to version 1.9.3 allows an attacker to remotely perform an unrestricted upload by manipulating some unknown functionality in the /answer file. This means an attacker can upload files without proper restrictions, potentially leading to unauthorized actions on the system.
How can this vulnerability impact me? :
The vulnerability can allow remote attackers to upload files without restriction, which may lead to unauthorized access, data compromise, or further exploitation of the affected system. This can result in loss of data integrity, confidentiality, and availability.
What immediate steps should I take to mitigate this vulnerability?
It is advisable to implement the patch identified as 95c3e23856465d202e6aec10bdb6ee0688b5305a to correct this issue.