A vulnerability was found in OpenRapid RapidCMS 1.3.1 and classified as critical. This issue affects some unknown processing of the file admin/run-movepass.php. The manipulation of the argument password/password2 leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 4dff387283060961c362d50105ff8da8ea40bcbe. It is recommended to apply a patch to fix this issue. The identifier VDB-237569 was assigned to this vulnerability.
History

Mon, 07 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2023-08-21T02:00:04.791Z

Updated: 2024-10-04T18:00:12.455Z

Reserved: 2023-08-20T07:11:30.609Z

Link: CVE-2023-4448

cve-icon Vulnrichment

Updated: 2024-08-02T07:24:05.079Z

cve-icon NVD

Status : Modified

Published: 2023-08-21T02:15:10.227

Modified: 2024-11-21T08:35:10.783

Link: CVE-2023-4448

cve-icon Redhat

No data.