Impact
The software processes a Password argument within its Password Change Handler; by manipulating this argument an attacker can change a user's password without conducting any authentication checks. If the account password is altered in this way, the attacker could subsequently access the account, although the specific privileges gained are not detailed in the description.
Affected Systems
The affected product is vichan, as identified by the CNA. Versions up to and including 5.1.5 are affected. The vulnerability resides in the inc/mod/pages.php file of the Password Change Handler module. No other product versions or vendors are listed as affected.
Risk and Exploitability
The CVSS score of 5.1 reflects moderate severity, while an EPSS score of less than 1% indicates a very low likelihood of exploitation in the wild. It is not listed in the CISA KEV catalog, suggesting no known public exploits. Based on the description, it is inferred that an attacker can send a crafted HTTP POST request to the password change endpoint, providing an arbitrary Password value while omitting any session or CSRF validation. The vendor was contacted but did not respond, so no official patch was available at the time. The attack requires only remote request manipulation and no prior authentication; if successful, it could allow the attacker to take over the target account.
OpenCVE Enrichment