Therefore Corporation GmbH has recently become aware that Therefore™ Online and Therefore™ On-Premises contain an account impersonation vulnerability. A malicious user may potentially be able to impersonate the web service account or the account of a service using the API when connecting to the Therefore™ Server. If the malicious user gains this impersonation user access, then it is possible for them to access the documents stored in Therefore™. This impersonation is at application level (Therefore access level), not the operating system level.
PUBLISHED5.2CWE-290x_cemeax_thereforex_subsidiary
Therefore™ Online and Therefore™ On-Premises contains an account impersonation issue, which could potentially allow the attacker to access all the stored data
Problem type
Affected products
Therefore Corporation GmbH
Therefore Online and Therefore On-Premises
<= 2025 - AFFECTED
References
GitHub Security Advisories
GHSA-j67p-5mwc-frf9
Therefore Corporation GmbH has recently become aware that Therefore™ Online and Therefore™ On...
https://github.com/advisories/GHSA-j67p-5mwc-frf9Therefore Corporation GmbH has recently become aware that Therefore™ Online and Therefore™ On-Premises contain an account impersonation vulnerability. A malicious user may potentially be able to impersonate the web service account or the account of a service using the API when connecting to the Therefore™ Server. If the malicious user gains this impersonation user access, then it is possible for them to access the documents stored in Therefore™. This impersonation is at application level (Therefore access level), not the operating system level.
JSON source
Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-11843",
"assignerOrgId": "4586e0a2-224d-4f8a-9cb4-8882b208c0b3",
"assignerShortName": "Canon_EMEA",
"dateUpdated": "2025-10-31T18:52:36.823Z",
"dateReserved": "2025-10-16T09:10:03.339Z",
"datePublished": "2025-10-31T09:43:08.597Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "4586e0a2-224d-4f8a-9cb4-8882b208c0b3",
"shortName": "Canon_EMEA",
"dateUpdated": "2025-10-31T09:43:08.597Z"
},
"datePublic": "2025-10-31T09:00:00.000Z",
"title": "Therefore™ Online and Therefore™ On-Premises contains an account impersonation issue, which could potentially allow the attacker to access all the stored data",
"descriptions": [
{
"lang": "en",
"value": "Therefore Corporation GmbH has recently become aware that Therefore™ Online and Therefore™ On-Premises contain an account impersonation vulnerability. A malicious user may potentially be able to impersonate the web service account or the account of a service using the API when connecting to the Therefore™ Server. If the malicious user gains this impersonation user access, then it is possible for them to access the documents stored in Therefore™. This impersonation is at application level (Therefore access level), not the operating system level.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "Therefore Corporation GmbH has recently become aware that Therefore™ Online and Therefore™ On-Premises contain an account impersonation vulnerability. A malicious user may potentially be able to impersonate the web service account or the account of a service using the API when connecting to the Therefore™ Server. If the malicious user gains this impersonation user access, then it is possible for them to access the documents stored in Therefore™. This impersonation is at application level (Therefore access level), not the operating system level.<br>"
}
]
}
],
"affected": [
{
"vendor": "Therefore Corporation GmbH",
"product": "Therefore Online and Therefore On-Premises",
"platforms": [
"Windows"
],
"defaultStatus": "affected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThanOrEqual": "2025"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-290: Authentication Bypass by Spoofing",
"cweId": "CWE-290",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.canon-europe.com/psirt/advisory-information/",
"tags": [
"vendor-advisory",
"mitigation"
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"tags": [
"x_cemea",
"x_therefore",
"x_subsidiary"
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-10-31T18:52:36.823Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}