Today > 2 Critical | 5 High | 12 Medium vulnerabilities   -   You can now download lists of IOCs here!

CVE-2025-22144

Jan. 13, 2025, 9:15 p.m.

Product(s) Impacted

NamelessMC

  • 2.1.3

Description

NamelessMC is a free, easy to use & powerful website software for Minecraft servers. A user with admincp.core.emails or admincp.users.edit permissions can validate users and an attacker can reset their password. When the account is successfully approved by email the reset code is NULL, but when the account is manually validated by a user with admincp.core.emails or admincp.users.edit permissions then the reset_code will no longer be NULL but empty. An attacker can request http://localhost/nameless/index.php?route=/forgot_password/&c= and reset the password. As a result an attacker may compromise another users password and take over their account. This issue has been addressed in release version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Weaknesses

CWE-610
Externally Controlled Reference to a Resource in Another Sphere

The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.

CWE ID: 610

Date

Published: Jan. 13, 2025, 8:15 p.m.

Last Modified: Jan. 13, 2025, 9:15 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

security-advisories@github.com

References

https://github.com/ security-advisories@github.com

https://github.com/ security-advisories@github.com

https://github.com/ 134c704f-9b21-4f2e-91b3-4a467353bcc0