First published: Fri Dec 02 2016(Updated: )
The "lost password" functionality in b2evolution before 6.7.9 allows remote attackers to reset arbitrary user passwords via a crafted request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Evolution | <=6.7.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9479 is considered a high-severity vulnerability due to its potential for unauthorized password resets.
To fix CVE-2016-9479, upgrade b2evolution to version 6.7.9 or later.
CVE-2016-9479 allows remote attackers to reset arbitrary user passwords, compromising user accounts.
Any b2evolution version prior to 6.7.9 is affected by CVE-2016-9479.
Any user of b2evolution versions 6.7.8 and earlier is vulnerable to CVE-2016-9479.