Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-31752 | TitanSystems Zender v3.9.7 contains an account takeover vulnerability in its password reset functionality. A temporary password or reset token issued to one user can be used to log in as another user, due to improper validation of token-user linkage. This allows remote attackers to gain unauthorized access to any user account by exploiting the password reset mechanism. The vulnerability occurs because the reset token is not correctly bound to the requesting account and is accepted for other user emails during login, enabling privilege escalation and information disclosure. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 18 Oct 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:titansystems:zender:3.9.7:*:*:*:*:*:*:* |
Thu, 02 Oct 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Titansystems
Titansystems zender |
|
Vendors & Products |
Titansystems
Titansystems zender |
Wed, 01 Oct 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-1259 | |
Metrics |
cvssV3_1
|
Tue, 30 Sep 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | TitanSystems Zender v3.9.7 contains an account takeover vulnerability in its password reset functionality. A temporary password or reset token issued to one user can be used to log in as another user, due to improper validation of token-user linkage. This allows remote attackers to gain unauthorized access to any user account by exploiting the password reset mechanism. The vulnerability occurs because the reset token is not correctly bound to the requesting account and is accepted for other user emails during login, enabling privilege escalation and information disclosure. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-01T19:55:42.883Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-56676

Updated: 2025-10-01T19:55:39.075Z

Status : Analyzed
Published: 2025-09-30T16:15:53.097
Modified: 2025-10-18T01:49:15.320
Link: CVE-2025-56676

No data.

Updated: 2025-10-02T08:46:16Z