CVE-2025-1108
Published: 07 February 2025
Summary
CVE-2025-1108 is a high-severity Insufficient Verification of Data Authenticity (CWE-345) vulnerability in Incibe (inferred from references). Its CVSS base score is 8.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-7 (Software, Firmware, and Information Integrity).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the vulnerability by validating and sanitizing the 'Xml' parameter in POST requests to /public/cgi/Gateway.php to prevent malicious content injection.
Enforces software and information integrity checks to verify data authenticity before processing, addressing the core insufficient verification flaw in CWE-345.
Restricts the types and formats of inputs to the vulnerable endpoint, limiting the ability to inject unauthorized XML content for email modification.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated exploitation of a public-facing web endpoint (/public/cgi/Gateway.php) to tamper with password-reset email content.
NVD Description
Insufficient data authenticity verification vulnerability in Janto, versions prior to r12. This allows an unauthenticated attacker to modify the content of emails sent to reset the password. To exploit the vulnerability, the attacker must create a POST request by injecting…
more
malicious content into the ‘Xml’ parameter on the ‘/public/cgi/Gateway.php’ endpoint.
Deeper analysisAI
CVE-2025-1108 is an insufficient data authenticity verification vulnerability, classified under CWE-345, affecting Janto versions prior to r12. Published on 2025-02-07, it carries a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N). The flaw enables modification of password reset email content due to inadequate verification of data authenticity in the affected component.
An unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. By crafting a POST request to the /public/cgi/Gateway.php endpoint and injecting malicious content into the 'Xml' parameter, the attacker can alter the content of emails sent for password resets, achieving high integrity impact in a scoped attack scenario.
Mitigation details are available in the INCIBE-CERT advisory on multiple vulnerabilities in Janto at https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janto.
Details
- CWE(s)