Description
The login mechanism of Sage DPW 2021_06_004 displays distinct responses for valid and invalid usernames, allowing enumeration of existing accounts in versions before 2021_06_000. On-premise administrators can toggle this behavior in newer versions.
Published: 2026-04-01
Score: 3.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: User enumeration via login responses
Action: Patch
AI Analysis

Impact

The vulnerability arises when the Sage DPW login page returns different responses for valid versus invalid usernames. This subtle difference enables an attacker to test whether a given account exists, providing an information disclosure path that does not grant direct control but reveals user enumeration. The weakness aligns with CWE‑203, which concerns unintended information leaks through varying output. An enumerated list of users can be used for social engineering, credential guessing, or targeted attacks on privileged accounts, thus compromising confidentiality of account existence.

Affected Systems

Sage DPW installations running the 2021_06_004 build or earlier – specifically versions predating 2021_06_000 – are impacted. The vulnerability is identified in the Sage DPW product as published under the CPE 2025_06_004. On‑premise administrators have the ability to toggle the enumeration behavior in newer releases, but before version 2021_06_000 the feature cannot be disabled, leaving all such deployments susceptible.

Risk and Exploitability

The CVSS score of 3.7 places the issue in the low‑severity range, and the EPSS score of less than 1% indicates a very low probability of exploitation as of the current data. It is not listed in CISA’s KEV catalog. While the exploit requires only access to the web‑based login interface – a route likely available to anyone who can reach the Sage DPW instance – the impact is limited to account enumeration. Consequently the overall risk is modest, yet the vulnerability remains actionable for security teams that need to protect user information.

Generated by OpenCVE AI on April 8, 2026 at 21:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Sage DPW 2021_06_004 or a newer release if currently on a vulnerable version.
  • Log into the Sage DPW administrative console and disable the distinct username response setting to eliminate account enumeration.
  • Verify the mitigation by attempting a login with a non‑existent username and confirming the response matches that of valid accounts.
  • Consult Sage DPW documentation or support for detailed configuration guidance.

Generated by OpenCVE AI on April 8, 2026 at 21:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Title Account Enumeration via Username Disclosure in Sage DPW

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Title Account Enumeration via Distinct Login Responses in Sage DPW
Weaknesses CWE-200

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Sagedpw
Sagedpw sage Dpw
Weaknesses CWE-203
CPEs cpe:2.3:a:sagedpw:sage_dpw:2025_06_004:*:*:*:*:*:*:*
Vendors & Products Sagedpw
Sagedpw sage Dpw

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Title Account Enumeration via Distinct Login Responses in Sage DPW
First Time appeared Sage
Sage dpw
Weaknesses CWE-200
Vendors & Products Sage
Sage dpw

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description The login mechanism of Sage DPW 2021_06_004 displays distinct responses for valid and invalid usernames, allowing enumeration of existing accounts in versions before 2021_06_000. On-premise administrators can toggle this behavior in newer versions.
References
Metrics cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AC:H/AV:N/A:N/C:L/I:N/PR:N/S:U/UI:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-01T15:53:44.181Z

Reserved: 2025-12-12T00:00:00.000Z

Link: CVE-2025-67806

cve-icon Vulnrichment

Updated: 2026-04-01T15:53:38.923Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T16:23:48.323

Modified: 2026-04-07T19:37:26.290

Link: CVE-2025-67806

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:29:25Z

Weaknesses