A SQL injection vulnerability in the alldayoffs feature in Jorani up to v1.0.4, allows an authenticated attacker to execute arbitrary SQL commands via the entity parameter.
References
| Link | Resource |
|---|---|
| https://github.com/bbalet/jorani | Product |
| https://www.helx.io/blog/advisory-jorani/ | Exploit Third Party Advisory |
Configurations
History
03 Apr 2026, 11:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/bbalet/jorani - Product | |
| References | () https://www.helx.io/blog/advisory-jorani/ - Exploit, Third Party Advisory | |
| First Time |
Jorani jorani
Jorani |
|
| CPE | cpe:2.3:a:jorani:jorani:*:*:*:*:*:*:*:* |
11 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.6 |
| CWE | CWE-89 |
18 Feb 2026, 17:51
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
17 Feb 2026, 20:22
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-17 20:22
Updated : 2026-04-03 11:34
NVD link : CVE-2025-67102
Mitre link : CVE-2025-67102
CVE.ORG link : CVE-2025-67102
JSON object : View
Products Affected
jorani
- jorani
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
