An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to improper authentication mechanisms, an attacker with access to an active user session can change the account password without needing to know the current password. This vulnerability allows for unauthorized account takeover by bypassing the standard password change verification process. The issue was fixed in version 0.56.3.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-0197 | An issue was discovered in zenml-io/zenml versions up to and including 0.55.4. Due to improper authentication mechanisms, an attacker with access to an active user session can change the account password without needing to know the current password. This vulnerability allows for unauthorized account takeover by bypassing the standard password change verification process. The issue was fixed in version 0.56.3. |
![]() |
GHSA-j527-v579-m98h | Improper authentication in zenml |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 15 Oct 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-287 |
Wed, 15 Oct 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-620 |
Tue, 15 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 11 Oct 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zenml
Zenml zenml |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:zenml:zenml:*:*:*:*:*:*:*:* | |
Vendors & Products |
Zenml
Zenml zenml |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-10-15T12:49:36.087Z
Reserved: 2024-03-06T08:29:15.083Z
Link: CVE-2024-2213

Updated: 2024-08-01T19:03:39.114Z

Status : Modified
Published: 2024-06-06T19:15:53.890
Modified: 2025-10-15T13:15:42.293
Link: CVE-2024-2213

No data.

No data.