No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 21 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in funadmin up to 7.1.0-rc4. Affected by this issue is the function repass of the file app/frontend/controller/Member.php. Performing a manipulation of the argument forget_code/vercode results in weak password recovery. Remote exploitation of the attack is possible. The attack's complexity is rated as high. The exploitation is known to be difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | funadmin Member.php repass password recovery | |
| First Time appeared |
Funadmin
Funadmin funadmin |
|
| Weaknesses | CWE-640 | |
| CPEs | cpe:2.3:a:funadmin:funadmin:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Funadmin
Funadmin funadmin |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-21T23:02:11.258Z
Reserved: 2026-02-20T18:56:43.277Z
Link: CVE-2026-2895
No data.
Status : Received
Published: 2026-02-21T23:15:59.990
Modified: 2026-02-21T23:15:59.990
Link: CVE-2026-2895
No data.
OpenCVE Enrichment
No data.