Impact
The login endpoint of blueprintUE Self‑Hosted Edition does not enforce any throttling, lockout, or brute‑force protection. An attacker may submit an unlimited number of authentication requests at full network speed. Without rate limiting, per‑account counters, or CAPTCHA challenges, attackers can perform dictionary or credential‑stuffing attacks against known or guessed user accounts. This weakness, identified by CWE-307, can lead to unauthorized access, credential theft, and potentially full compromise of the application and underlying systems.
Affected Systems
All installations of blueprintUE Self‑Hosted Edition running any version earlier than 4.2.0 are affected. The vulnerability was fixed in version 4.2.0 and later releases have built‑in rate limiting and lockout mechanisms.
Risk and Exploitability
The CVSS score is 7.5, indicating a high impact with reasonable exploitation complexity. No EPSS data is available, and the vulnerability is not listed in CISA’s KEV catalog. Attackers need only to send repeated credential attempts against the login endpoint, which is accessible over the network, making it a likely target for automated brute‑force tools.
OpenCVE Enrichment