TitanSystems Zender v3.9.7 contains an account takeover vulnerability in its password reset functionality. A temporary password or reset token issued to one user can be used to log in as another user, due to improper validation of token-user linkage. This allows remote attackers to gain unauthorized access to any user account by exploiting the password reset mechanism. The vulnerability occurs because the reset token is not correctly bound to the requesting account and is accepted for other user emails during login, enabling privilege escalation and information disclosure.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 30 Sep 2025 15:45:00 +0000

Type Values Removed Values Added
Description TitanSystems Zender v3.9.7 contains an account takeover vulnerability in its password reset functionality. A temporary password or reset token issued to one user can be used to log in as another user, due to improper validation of token-user linkage. This allows remote attackers to gain unauthorized access to any user account by exploiting the password reset mechanism. The vulnerability occurs because the reset token is not correctly bound to the requesting account and is accepted for other user emails during login, enabling privilege escalation and information disclosure.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-09-30T15:30:54.381Z

Reserved: 2025-08-17T00:00:00.000Z

Link: CVE-2025-56676

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-30T16:15:53.097

Modified: 2025-09-30T16:15:53.097

Link: CVE-2025-56676

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.