CVE-2025-67102

A SQL injection vulnerability in the alldayoffs feature in Jorani up to v1.0.4, allows an authenticated attacker to execute arbitrary SQL commands via the entity parameter.
References
Link Resource
https://github.com/bbalet/jorani Product
https://www.helx.io/blog/advisory-jorani/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jorani:jorani:*:*:*:*:*:*:*:*

History

03 Apr 2026, 11:34

Type Values Removed Values Added
References () https://github.com/bbalet/jorani - () https://github.com/bbalet/jorani - Product
References () https://www.helx.io/blog/advisory-jorani/ - () https://www.helx.io/blog/advisory-jorani/ - Exploit, Third Party Advisory
First Time Jorani jorani
Jorani
CPE cpe:2.3:a:jorani:jorani:*:*:*:*:*:*:*:*

11 Mar 2026, 16:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.6
CWE CWE-89

18 Feb 2026, 17:51

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de inyección SQL en la funcionalidad alldayoffs de Jorani hasta la v1.0.4, permite a un atacante autenticado ejecutar comandos SQL arbitrarios a través del parámetro entity.

17 Feb 2026, 20:22

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-17 20:22

Updated : 2026-04-03 11:34


NVD link : CVE-2025-67102

Mitre link : CVE-2025-67102

CVE.ORG link : CVE-2025-67102


JSON object : View

Products Affected

jorani

  • jorani
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')