First published: Fri Apr 13 2018(Updated: )
CMS Made Simple (CMSMS) through 2.2.6 contains an admin password reset vulnerability because data values are improperly compared, as demonstrated by a hash beginning with the "0e" substring.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Simple CMS | <=2.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10081 is considered a high severity vulnerability due to the potential for unauthorized password resets in CMS Made Simple.
To fix CVE-2018-10081, upgrade CMS Made Simple to version 2.2.8 or later.
CVE-2018-10081 affects CMS Made Simple versions up to and including 2.2.7.
CVE-2018-10081 exploits improper data value comparisons during the admin password reset process.
Yes, CVE-2018-10081 can lead to unauthorized access and potential data breaches by allowing attackers to reset admin passwords.