First published: Tue Aug 17 2021(Updated: )
In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password.
Credit: vulnerabilitylab@mend.io
Affected Software | Affected Version | How to fix |
---|---|---|
Dolibarr Dolibarr | >=2.8.1<=13.0.2 |
Update to 14.0.0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25957 is a vulnerability found in the Dolibarr application, versions 2.8.1 to 13.0.2, which allows a low privileged attacker to take over user accounts via the password reset functionality.
CVE-2021-25957 has a severity rating of 8.8, which is considered high.
An attacker can exploit CVE-2021-25957 by using the password reset link received through email to reset the password of any user in the Dolibarr application.
Yes, a fix for CVE-2021-25957 is available. It is recommended to update Dolibarr to a version higher than 13.0.2 to mitigate the vulnerability.
You can find more information about CVE-2021-25957 on the GitHub commit and the WhiteSource Software vulnerability database.