Description
EverShop is a TypeScript-first eCommerce platform. Versions prior to 2.1.1 have a vulnerability in the "Forgot Password" functionality. When specifying a target email address, the API response returns the password reset token. This allows an attacker to take over the associated account. Version 2.1.1 fixes the issue.
Published: 2026-02-26
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Account takeover
Action: Patch Immediately
AI Analysis

Impact

A flaw in EverShop's "Forgot Password" feature exposes the password reset token in the API response when an email address is supplied. This accidental disclosure allows an attacker to acquire a valid token and use it to access the associated customer account, effectively bypassing authentication. The weakness is a clear breach of information confidentiality (CWE‑200) and is exploited for account takeover (CWE‑640).

Affected Systems

The vulnerability afflicts the evershopcommerce evershop platform in all releases earlier than version 2.1.1. Users running those older builds are at risk, while version 2.1.1 and later contain the fix.

Risk and Exploitability

With a CVSS score of 9.8, the problem is of high severity. Although the EPSS score is reported as less than 1 %, the exposure occurs over a public API, so remote attackers can trigger it without special privileges. The issue is not currently listed in the CISA KEV catalog, but its potential for immediate account compromise warrants urgent attention. The likely attack path is a simple HTTP request to the reset endpoint with any email address, followed by reuse of the visible token to log in as that user.

Generated by OpenCVE AI on April 16, 2026 at 15:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade EverShop to version 2.1.1 or later, which removes the token from the password‑reset API response.
  • Verify that subsequent password‑reset requests no longer return the reset token in the response payload or any public log output.
  • Disable external password‑reset functionality or restrict it to internal use until the patch is applied, ensuring reset tokens are not exposed via the API.
  • Implement monitoring of the reset endpoint for anomalous usage patterns and alert on frequent or repeated reset requests that could indicate exploitation attempts.

Generated by OpenCVE AI on April 16, 2026 at 15:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Feb 2026 01:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:evershop:evershop:*:*:*:*:*:node.js:*:*

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Evershop
Evershop evershop
Vendors & Products Evershop
Evershop evershop

Thu, 26 Feb 2026 23:00:00 +0000

Type Values Removed Values Added
Description EverShop is a TypeScript-first eCommerce platform. Versions prior to 2.1.1 have a vulnerability in the "Forgot Password" functionality. When specifying a target email address, the API response returns the password reset token. This allows an attacker to take over the associated account. Version 2.1.1 fixes the issue.
Title EverShop Vulnerable to Arbitrary Customer Account Takeover via Exposure of Password Reset Token in API Response
Weaknesses CWE-200
CWE-640
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Evershop Evershop
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-27T18:51:10.647Z

Reserved: 2026-02-25T15:28:40.649Z

Link: CVE-2026-28213

cve-icon Vulnrichment

Updated: 2026-02-27T18:51:02.524Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-26T23:16:35.770

Modified: 2026-02-28T01:18:18.080

Link: CVE-2026-28213

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T16:00:13Z

Weaknesses