Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.canon-europe.com/psirt/advisory-information/ |
|
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Therefore Corporation
Therefore Corporation therefore |
|
| Vendors & Products |
Therefore Corporation
Therefore Corporation therefore |
Fri, 31 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 31 Oct 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Therefore Corporation GmbH has recently become aware that Therefore™ Online and Therefore™ On-Premises contain an account impersonation vulnerability. A malicious user may potentially be able to impersonate the web service account or the account of a service using the API when connecting to the Therefore™ Server. If the malicious user gains this impersonation user access, then it is possible for them to access the documents stored in Therefore™. This impersonation is at application level (Therefore access level), not the operating system level. | |
| Title | Therefore™ Online and Therefore™ On-Premises contains an account impersonation issue, which could potentially allow the attacker to access all the stored data | |
| Weaknesses | CWE-290 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Canon_EMEA
Published:
Updated: 2025-10-31T18:52:36.823Z
Reserved: 2025-10-16T09:10:03.339Z
Link: CVE-2025-11843
Updated: 2025-10-31T18:46:57.988Z
Status : Deferred
Published: 2025-10-31T10:15:35.800
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-11843
No data.
OpenCVE Enrichment
Updated: 2025-11-03T10:45:00Z