Access Control Flaw in CMS Made Simple by CMS Made Simple, Inc.
CVE-2018-1000158

8.8HIGH

Key Information:

Vendor
CVE Published:
18 April 2018

Summary

CMS Made Simple version 2.2.7 is susceptible to an Incorrect Access Control vulnerability in the send_recovery_email function. This flaw allows an attacker to create a manipulated password reset URL that points to a malicious server. By leveraging a host header attack, unauthorized users can exploit this weakness, leading to potential unauthorized access and administrative password reset poisoning. Users of this version are encouraged to implement security measures to mitigate risks associated with this vulnerability.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.