Weak Password Recovery Mechanism for Forgotten Password in phpMyFAQ - #VU131756

 

Weak Password Recovery Mechanism for Forgotten Password in phpMyFAQ - #VU131756

Published: May 18, 2026


Vulnerability identifier: #VU131756
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: N/A
CWE-ID: CWE-640
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Thorsten Rinne
Affected software:
phpMyFAQ

Detailed vulnerability description

The vulnerability allows a remote attacker to modify another user's password.

The vulnerability exists due to a weak password recovery mechanism in the UnauthorizedUserController password reset flow when processing unauthenticated password reset requests that only verify a username and email match. A remote attacker can send a password reset request for another user's account to modify another user's password.

The password is changed immediately before any out-of-band confirmation step occurs, which causes the victim's old password to stop working.


Remediation

Install security update from vendor's website.

Sources