Submit #194675: Administrator password reset vulnerability exists in RapidCMS Dev.1.3.1info

TitleAdministrator password reset vulnerability exists in RapidCMS Dev.1.3.1
Description[Suggested description] RapidCMS Dev.1.3.1 was discovered to contain Administrator password reset vulnerability in `admin/run-movepass.php`. [Vulnerability Type] Unauthorized Access Vulnerability [Vendor of Product] https://github.com/OpenRapid/rapidcms [Affected Product Code Base] RapidCMS Dev.1.3.1 [Attack Type] Remote [Vulnerability demonstration] https://github.com/OpenRapid/rapidcms/issues/5 [Cause of vulnerability] In `admin/run-movepass.php`, the developer did not perform user permission authentication on the access to the file, and the attacker could control the values of the `password` and `password2` parameters, thereby unauthorized modification of the administrator password.
Source⚠️ https://github.com/OpenRapid/rapidcms/issues/5
User
 TXPH (UID 50296)
Submission08/13/2023 10:34 (3 years ago)
Moderation08/20/2023 09:11 (7 days later)
StatusAccepted
VulDB entry237569 [OpenRapid RapidCMS 1.3.1 admin/run-movepass.php password/password2 password recovery]
Points20

Want to know what is going to be exploited?

We predict KEV entries!