Weak Password Recovery in Sangfor Operation and Maintenance Security Management System
CVE-2026-1325

6.9MEDIUM

Key Information:

Vendor

Sangfor

Vendor
CVE Published:
22 January 2026

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2026-1325?

A security flaw exists in the Sangfor Operation and Maintenance Security Management System prior to version 3.0.12, specifically affecting the password recovery function. This vulnerability allows attackers to manipulate the 'flag' argument in the /fort/login/edit_pwd_mall endpoint, leading to weak password recovery mechanisms. The issue can be exploited remotely, exposing affected systems to potential unauthorized access. Notably, the exploit code has already been made publicly available, increasing the urgency for users to secure their systems. Despite early notifications regarding the flaw, Sangfor has not addressed the issue.

Affected Version(s)

Operation and Maintenance Security Management System 3.0.0

Operation and Maintenance Security Management System 3.0.1

Operation and Maintenance Security Management System 3.0.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

LINXI666 (VulDB User)
.