Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-837q-78w5-p6p8

Опубликовано: 05 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 1.3
CVSS3: 3.1

Описание

A flaw has been found in elunez eladmin up to 2.7. This impacts the function updateUserEmail of the file /api/users/updateEmail/ of the component Email Address Handler. Executing manipulation of the argument id/email can lead to improper authorization. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is said to be difficult. The exploit has been published and may be used. It is required to know the RSA-encrypted password of the attacked user account.

A flaw has been found in elunez eladmin up to 2.7. This impacts the function updateUserEmail of the file /api/users/updateEmail/ of the component Email Address Handler. Executing manipulation of the argument id/email can lead to improper authorization. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is said to be difficult. The exploit has been published and may be used. It is required to know the RSA-encrypted password of the attacked user account.

EPSS

Процентиль: 6%
0.00025
Низкий

1.3 Low

CVSS4

3.1 Low

CVSS3

Дефекты

CWE-266

Связанные уязвимости

CVSS3: 3.1
nvd
5 месяцев назад

A flaw has been found in elunez eladmin up to 2.7. This impacts the function updateUserEmail of the file /api/users/updateEmail/ of the component Email Address Handler. Executing manipulation of the argument id/email can lead to improper authorization. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is said to be difficult. The exploit has been published and may be used. It is required to know the RSA-encrypted password of the attacked user account.

EPSS

Процентиль: 6%
0.00025
Низкий

1.3 Low

CVSS4

3.1 Low

CVSS3

Дефекты

CWE-266