Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 19 Dec 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:opensourcepos:open_source_point_of_sale:3.4.1:*:*:*:*:*:*:* |
Wed, 19 Nov 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opensourcepos
Opensourcepos open Source Point Of Sale |
|
| Vendors & Products |
Opensourcepos
Opensourcepos open Source Point Of Sale |
Tue, 18 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-521 | |
| Metrics |
cvssV3_1
|
Tue, 18 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The password change endpoint in Open Source Point of Sale 3.4.1 allows users to set their account password to an empty string due to missing server-side validation. When an authenticated user omits or leaves the `password` and `repeat_password` parameters empty in the password change request, the backend still returns a successful response and sets the password to an empty string. This effectively disables authentication and may allow unauthorized access to user or administrative accounts. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-18T17:08:08.461Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63800
Updated: 2025-11-18T17:08:02.027Z
Status : Analyzed
Published: 2025-11-18T16:15:46.310
Modified: 2025-12-19T16:51:22.513
Link: CVE-2025-63800
No data.
OpenCVE Enrichment
Updated: 2025-11-19T10:47:49Z