cve/2021/CVE-2021-25961.md

19 lines
942 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-25961](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25961)
![](https://img.shields.io/static/v1?label=Product&message=SuiteCRM&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=v7.1.7%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=v7.11%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password&color=brightgreen)
2024-05-25 21:48:12 +02:00
### Description
In “SuiteCRM” application, v7.1.7 through v7.10.31 and v7.11-beta through v7.11.20 fail to properly invalidate password reset links that is associated with a deleted user id, which makes it possible for account takeover of any newly created user with the same user id.
### POC
#### Reference
- https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25961
#### Github
No PoCs found on GitHub currently.