Impact
An attacker can trigger a crafted password change request that does not validate the user's current password, allowing the target account to be reset without authentication. This flaw permits remote alteration of an account’s password, potentially enabling an attacker to take control of that account if the new password is known or guessed. The weakness is a direct authentication bypass classified as CWE‑620.
Affected Systems
Devolutions Server versions 2026.1.6.0 through 2026.1.16.0 and 2025.3.20.0 and all earlier releases. All affected installations expose the vulnerable password‑change endpoint without requiring prior authentication.
Risk and Exploitability
The CVSS score of 3.1 indicates low severity, the EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a network request to the password‑change API, and exploitation requires no special privileges beyond sending a crafted request.
OpenCVE Enrichment