First published: Sun May 11 2025(Updated: )
A vulnerability has been found in ContiNew Admin up to 3.6.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dev-api/system/user/1/password. The manipulation leads to unverified password change. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Continew | <=3.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4552 is classified as problematic due to the potential for unauthorized password changes.
To fix CVE-2025-4552, update your ContiNew Admin software to a version greater than 3.6.0.
The consequences of CVE-2025-4552 include the risk of unauthorized access to user accounts through unverified password changes.
CVE-2025-4552 affects users of ContiNew Admin versions up to and including 3.6.0.
As of now, there is no public evidence of exploitation for CVE-2025-4552, but the vulnerability poses significant risks.