Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Upgrade Rising Technosoft CAP back office application to the version 2.0.4 or later.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-6264 | This vulnerability exists in the CAP back office application due to a weak password-reset mechanism implemented at API endpoints. An authenticated remote attacker with a valid login ID could exploit this vulnerability through vulnerable API endpoint which could lead to account takeover of targeted users. |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 13 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Mar 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | This vulnerability exists in the CAP back office application due to a weak password-reset mechanism implemented at API endpoints. An authenticated remote attacker with a valid login ID could exploit this vulnerability through vulnerable API endpoint which could lead to account takeover of targeted users. | |
| Title | Account Takeover Vulnerability in CAP back office application | |
| Weaknesses | CWE-640 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: CERT-In
Published:
Updated: 2025-03-13T19:36:58.038Z
Reserved: 2025-03-13T06:38:16.282Z
Link: CVE-2025-29995
Updated: 2025-03-13T19:36:53.630Z
Status : Deferred
Published: 2025-03-13T12:15:13.830
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-29995
No data.
OpenCVE Enrichment
No data.
EUVD