TitanSystems Zender v3.9.7 contains an account takeover vulnerability in its password reset functionality. A temporary password or reset token issued to one user can be used to log in as another user, due to improper validation of token-user linkage. This allows remote attackers to gain unauthorized access to any user account by exploiting the password reset mechanism. The vulnerability occurs because the reset token is not correctly bound to the requesting account and is accepted for other user emails during login, enabling privilege escalation and information disclosure.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 30 Sep 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | TitanSystems Zender v3.9.7 contains an account takeover vulnerability in its password reset functionality. A temporary password or reset token issued to one user can be used to log in as another user, due to improper validation of token-user linkage. This allows remote attackers to gain unauthorized access to any user account by exploiting the password reset mechanism. The vulnerability occurs because the reset token is not correctly bound to the requesting account and is accepted for other user emails during login, enabling privilege escalation and information disclosure. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-30T15:30:54.381Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-56676

No data.

Status : Received
Published: 2025-09-30T16:15:53.097
Modified: 2025-09-30T16:15:53.097
Link: CVE-2025-56676

No data.

No data.