Description
A vulnerability was determined in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this vulnerability is an unknown functionality of the file /api/admin/sys-user/reset/password/ of the component Password Reset Handler. This manipulation of the argument userId causes use of default password. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.3.3-beta addresses this issue. Patch name: aefaabfd7527188bfba3c8c9eee17c316d094802. It is suggested to upgrade the affected component. The project was informed beforehand and acted very professional: "We have added authorization validation to the password reset interface; now only users with the corresponding permissions are allowed to perform password resets."
Published: 2026-02-25
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Password Reset to Default Password
Action: Immediate Patch
AI Analysis

Impact

A flaw in the /api/admin/sys-user/reset/password/ endpoint of feiyuchuixue sz-boot-parent allows an attacker to manipulate the userId parameter, causing the system to assign the account a known default password. This weakness, identified as CWE-1393, lets an adversary reset any user’s password without legitimate credentials, effectively hijacking the account and its privileges.

Affected Systems

All beta releases of feiyuchuixue sz-boot-parent up to version 1.3.2, including releases 1.0.0 through 1.3.2, are affected. The product is distributed under the cpe:2.3:a:szadmin:sz-boot-parent namespace and is hosted on GitHub under the feiyuchuixue:sz-boot-parent repository.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, while the EPSS score of less than 1% suggests a low but non‑zero likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog, but a public exploit exists and can be triggered remotely via the password reset API. An attacker with network access to the application can craft a request to the endpoint, force the reset, and then log in with the default password, gaining the target account’s privileges. No higher privileges or additional conditions are required, making the attack vector likely to be remote over HTTP or HTTPS.

Generated by OpenCVE AI on April 18, 2026 at 10:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the released 1.3.3‑beta patch, which adds authorization checks to the password reset endpoint.
  • Require authentication and administrative‑level roles before allowing the /api/admin/sys-user/reset/password/ operation; enforce this via application logic or a reverse‑proxy access policy.
  • If a patch or role configuration cannot be applied immediately, restrict the endpoint to internal networks using firewall rules or disable it entirely to prevent external exploitation.

Generated by OpenCVE AI on April 18, 2026 at 10:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Szadmin
Szadmin sz-boot-parent
CPEs cpe:2.3:a:szadmin:sz-boot-parent:*:*:*:*:*:*:*:*
cpe:2.3:a:szadmin:sz-boot-parent:1.0.0:beta:*:*:*:*:*:*
cpe:2.3:a:szadmin:sz-boot-parent:1.0.1:beta:*:*:*:*:*:*
cpe:2.3:a:szadmin:sz-boot-parent:1.0.2:beta:*:*:*:*:*:*
cpe:2.3:a:szadmin:sz-boot-parent:1.1.0:beta:*:*:*:*:*:*
cpe:2.3:a:szadmin:sz-boot-parent:1.2.0:beta:*:*:*:*:*:*
cpe:2.3:a:szadmin:sz-boot-parent:1.2.1:beta:*:*:*:*:*:*
cpe:2.3:a:szadmin:sz-boot-parent:1.2.2:beta:*:*:*:*:*:*
cpe:2.3:a:szadmin:sz-boot-parent:1.2.3:beta:*:*:*:*:*:*
cpe:2.3:a:szadmin:sz-boot-parent:1.2.4:beta:*:*:*:*:*:*
cpe:2.3:a:szadmin:sz-boot-parent:1.2.5:beta:*:*:*:*:*:*
cpe:2.3:a:szadmin:sz-boot-parent:1.2.6:beta:*:*:*:*:*:*
cpe:2.3:a:szadmin:sz-boot-parent:1.3.0:beta:*:*:*:*:*:*
cpe:2.3:a:szadmin:sz-boot-parent:1.3.1:beta:*:*:*:*:*:*
cpe:2.3:a:szadmin:sz-boot-parent:1.3.2:beta:*:*:*:*:*:*
Vendors & Products Szadmin
Szadmin sz-boot-parent

Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Feiyuchuixue
Feiyuchuixue sz-boot-parent
Vendors & Products Feiyuchuixue
Feiyuchuixue sz-boot-parent

Wed, 25 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this vulnerability is an unknown functionality of the file /api/admin/sys-user/reset/password/ of the component Password Reset Handler. This manipulation of the argument userId causes use of default password. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.3.3-beta addresses this issue. Patch name: aefaabfd7527188bfba3c8c9eee17c316d094802. It is suggested to upgrade the affected component. The project was informed beforehand and acted very professional: "We have added authorization validation to the password reset interface; now only users with the corresponding permissions are allowed to perform password resets."
Title feiyuchuixue sz-boot-parent Password Reset password default password
Weaknesses CWE-1393
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Feiyuchuixue Sz-boot-parent
Szadmin Sz-boot-parent
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-25T14:28:19.370Z

Reserved: 2026-02-25T08:32:07.493Z

Link: CVE-2026-3186

cve-icon Vulnrichment

Updated: 2026-02-25T14:28:13.800Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T14:16:21.767

Modified: 2026-02-26T15:53:14.073

Link: CVE-2026-3186

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:45:43Z

Weaknesses