Description
In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password.
Published: 2021-08-17
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Solution

Update to 14.0.0

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-2030 In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password.
Github GHSA Github GHSA GHSA-c32w-3cqh-f6jx Weak Password Recovery Mechanism for Forgotten Password
History

No history.

Subscriptions

Dolibarr Dolibarr
cve-icon MITRE

Status: PUBLISHED

Assigner: Mend

Published:

Updated: 2024-09-17T01:51:51.602Z

Reserved: 2021-01-22T00:00:00.000Z

Link: CVE-2021-25957

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-08-17T15:15:08.040

Modified: 2024-11-21T05:55:40.397

Link: CVE-2021-25957

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses