| Titre | iteachyou-wjn dreamer_cms latest broken function level authorization |
|---|
| Description | An attacker logs into the application with a low-privileged user account (e.g., attacker).
The attacker obtains the user ID and the current password of a victim user (e.g., admin). This could be achieved through weak password guessing, social engineering, or another vulnerability.
The attacker sends a POST request to the /admin/user/updatePwd endpoint with a JSON payload containing the victim's ID, the victim's current password, and a new password chosen by the attacker. |
|---|
| La source | ⚠️ https://www.cnblogs.com/aibot/p/19063320 |
|---|
| Utilisateur | Anonymous User |
|---|
| Soumission | 28/08/2025 17:38 (il y a 8 mois) |
|---|
| Modérer | 12/09/2025 10:09 (15 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 323746 [iteachyou Dreamer CMS jusqu’à 4.1.3.2 /admin/user/updatePwd authentification faible] |
|---|
| Points | 20 |
|---|