Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67102: n/a

0
Unknown
VulnerabilityCVE-2025-67102cvecve-2025-67102
Published: Tue Feb 17 2026 (02/17/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A SQL injection vulnerability in the alldayoffs feature in Jorani up to v1.0.4, allows an authenticated attacker to execute arbitrary SQL commands via the entity parameter.

AI-Powered Analysis

AILast updated: 02/18/2026, 08:33:06 UTC

Technical Analysis

CVE-2025-67102 identifies a SQL injection vulnerability in the alldayoffs feature of the Jorani open-source leave management system, affecting versions up to 1.0.4. The vulnerability arises because the entity parameter in this feature is not properly sanitized, allowing an authenticated attacker to inject arbitrary SQL commands. This flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data retrieval, modification, or deletion. Since the attacker must be authenticated, the attack surface is limited to users with valid credentials, but no further user interaction is required. The vulnerability does not have a published CVSS score or known exploits in the wild yet. However, SQL injection remains a critical class of vulnerabilities due to its potential to compromise data confidentiality, integrity, and availability. Jorani is used primarily for managing employee leave and HR-related workflows, meaning sensitive personnel data could be exposed or altered. The lack of a patch link indicates that a fix may not yet be publicly available, increasing the urgency for organizations to implement interim mitigations. The vulnerability was reserved in December 2025 and published in February 2026, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of HR and employee data managed within Jorani. Successful exploitation could allow attackers to extract sensitive personal information, alter leave records, or disrupt HR operations, potentially leading to compliance violations under GDPR and other privacy regulations. The availability of the leave management system could also be impacted if attackers execute destructive SQL commands. Organizations relying on Jorani for critical HR functions may face operational disruptions and reputational damage. Since exploitation requires authentication, insider threats or compromised credentials are primary risk vectors. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. The impact is heightened in sectors with stringent data protection requirements, such as finance, healthcare, and government institutions across Europe.

Mitigation Recommendations

Organizations should immediately review and restrict access to the alldayoffs feature within Jorani, limiting it to trusted users only. Implement strong authentication and monitor for unusual access patterns to detect potential abuse. Until an official patch is released, apply input validation and sanitization controls at the application or database layer to block malicious SQL payloads targeting the entity parameter. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts specific to this vulnerability. Conduct thorough code reviews and penetration testing focused on the alldayoffs feature to identify and remediate injection points. Regularly update Jorani to the latest version once patches become available. Additionally, enforce the principle of least privilege on database accounts used by Jorani to minimize the impact of any successful injection. Maintain comprehensive logging and alerting to facilitate rapid incident response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699575bb80d747be2053769e

Added to database: 2/18/2026, 8:18:03 AM

Last enriched: 2/18/2026, 8:33:06 AM

Last updated: 2/21/2026, 12:16:37 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats