First published: Mon Jan 13 2025(Updated: )
NamelessMC is a free, easy to use & powerful website software for Minecraft servers. A user with admincp.core.emails or admincp.users.edit permissions can validate users and an attacker can reset their password. When the account is successfully approved by email the reset code is NULL, but when the account is manually validated by a user with admincp.core.emails or admincp.users.edit permissions then the reset_code will no longer be NULL but empty. An attacker can request http://localhost/nameless/index.php?route=/forgot_password/&c= and reset the password. As a result an attacker may compromise another users password and take over their account. This issue has been addressed in release version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
NamelessMC | <2.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22144 has been rated as a high severity vulnerability due to the potential for unauthorized account access.
To fix CVE-2025-22144, update your NamelessMC installation to version 2.1.4 or later.
CVE-2025-22144 affects users of NamelessMC versions prior to 2.1.4, specifically those with admincp.core.emails or admincp.users.edit permissions.
CVE-2025-22144 is a vulnerability involving improper access control that may allow an attacker to reset user passwords.
Yes, CVE-2025-22144 can be exploited remotely by attackers with appropriate permissions.