Description
A vulnerability was identified in vichan-devel vichan up to 5.1.5. This vulnerability affects unknown code of the file inc/mod/pages.php of the component Password Change Handler. The manipulation of the argument Password leads to unverified password change. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-16
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Password Change
Action: Apply Patch
AI Analysis

Impact

The software processes a Password argument within its Password Change Handler; by manipulating this argument an attacker can change a user's password without conducting any authentication checks. If the account password is altered in this way, the attacker could subsequently access the account, although the specific privileges gained are not detailed in the description.

Affected Systems

The affected product is vichan, as identified by the CNA. Versions up to and including 5.1.5 are affected. The vulnerability resides in the inc/mod/pages.php file of the Password Change Handler module. No other product versions or vendors are listed as affected.

Risk and Exploitability

The CVSS score of 5.1 reflects moderate severity, while an EPSS score of less than 1% indicates a very low likelihood of exploitation in the wild. It is not listed in the CISA KEV catalog, suggesting no known public exploits. Based on the description, it is inferred that an attacker can send a crafted HTTP POST request to the password change endpoint, providing an arbitrary Password value while omitting any session or CSRF validation. The vendor was contacted but did not respond, so no official patch was available at the time. The attack requires only remote request manipulation and no prior authentication; if successful, it could allow the attacker to take over the target account.

Generated by OpenCVE AI on April 18, 2026 at 18:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch or upgrade to the latest version of vichan that contains the fix for the unverified password change flaw.
  • If an immediate update is not possible, modify the password change handler to enforce that a valid session or CSRF token is present before changing a password.
  • Require that the user’s current password or a specific verification link be supplied before allowing a password change to be processed.
  • Implement rate limiting or monitoring for password change attempts to detect and block automated exploitation.

Generated by OpenCVE AI on April 18, 2026 at 18:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Vichan-devel
Vichan-devel vichan
Vendors & Products Vichan-devel
Vichan-devel vichan

Mon, 16 Feb 2026 07:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in vichan-devel vichan up to 5.1.5. This vulnerability affects unknown code of the file inc/mod/pages.php of the component Password Change Handler. The manipulation of the argument Password leads to unverified password change. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Title vichan-devel vichan Password Change pages.php unverified password change
Weaknesses CWE-620
CWE-640
References
Metrics cvssV2_0

{'score': 3.3, 'vector': 'AV:N/AC:L/Au:M/C:N/I:P/A:N/E:ND/RL:ND/RC:UR'}

cvssV3_0

{'score': 2.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N/E:X/RL:X/RC:R'}

cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N/E:X/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Vichan-devel Vichan
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:06:50.195Z

Reserved: 2026-02-15T15:51:48.549Z

Link: CVE-2026-2543

cve-icon Vulnrichment

Updated: 2026-02-17T21:04:29.108Z

cve-icon NVD

Status : Deferred

Published: 2026-02-16T07:17:01.007

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2543

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:15:06Z

Weaknesses