A vulnerability was found in Antabot White-Jotter 0.22. It has been declared as critical. This vulnerability affects the function CookieRememberMeManager of the file ShiroConfiguration.java of the component com.gm.wj.config.ShiroConfiguration. The manipulation with the input EVANNIGHTLY_WAOU leads to deserialization. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/Antabot/White-Jotter/issues/161 | Exploit Issue Tracking |
| https://github.com/Antabot/White-Jotter/issues/161#issue-3254420874 | Exploit Issue Tracking |
| https://vuldb.com/?ctiid.319138 | Permissions Required VDB Entry |
| https://vuldb.com/?id.319138 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.621105 | Third Party Advisory VDB Entry |
| https://github.com/Antabot/White-Jotter/issues/161#issue-3254420874 | Exploit Issue Tracking |
Configurations
History
No history.
Information
Published : 2025-08-08 03:15
Updated : 2025-08-21 20:54
NVD link : CVE-2025-8708
Mitre link : CVE-2025-8708
CVE.ORG link : CVE-2025-8708
JSON object : View
Products Affected
antabot
- white-jotter
