CWE-620

Unverified Password Change

36 CVEs Avg CVSS 7.6 MITRE
15
CRITICAL
7
HIGH
8
MEDIUM
5
LOW
6
POC
0
KEV

Monthly

CVE-2026-30458 CRITICAL Act Now

Daylight Studio FuelCMS v1.5.2 allows remote attackers to exfiltrate password reset tokens through a mail splitting attack, enabling account takeover without authentication. The vulnerability exploits improper handling of email headers during the password reset workflow, permitting attackers to intercept or redirect sensitive reset tokens to attacker-controlled addresses. No public exploit code or active exploitation has been independently confirmed at time of analysis.

Information Disclosure
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-27757 HIGH This Week

Sl902-Swtgw124As Firmware versions up to 200.1.20 contains a vulnerability that allows attackers to change account passwords without verifying the current password (CVSS 7.1).

Information Disclosure Sl902 Swtgw124as Firmware
NVD
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-24443 HIGH This Week

Eventsentry versions up to 6.0.1.20 contains a vulnerability that allows attackers to privilege escalation (CVSS 8.8).

Privilege Escalation Eventsentry
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-2543 LOW Monitor

A vulnerability was identified in vichan-devel vichan versions up to 5.1.5. contains a security vulnerability (CVSS 2.7).

PHP
NVD GitHub VulDB
CVSS 3.1
2.7
EPSS
0.0%
CVE-2026-24440 HIGH This Week

Unauthenticated password modification in Tenda W30E V2 firmware through the maintenance interface allows authenticated users to reset account credentials without password verification, potentially enabling privilege escalation or account takeover on affected devices. The vulnerability affects firmware versions up to V16.01.0.19(5037) and currently lacks an available patch.

Authentication Bypass W30e Firmware
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-14751 Monitor

A low-privileged user can bypass account credentials without confirming the user's current authentication state, which may lead to unauthorized privilege escalation.

Privilege Escalation
NVD
EPSS
0.0%
CVE-2025-11235 LOW Monitor

Unverified Password Change vulnerability in Progress MOVEit Transfer on Windows (REST API modules).This issue affects MOVEit Transfer: from 2023.1.0 before 2023.1.3, from 2023.0.0 before 2023.0.8, from 2022.1.0 before 2022.1.11, from 2022.0.0 before 2022.0.10. [CVSS 3.7 LOW]

Windows
NVD
CVSS 3.1
3.7
EPSS
0.0%
CVE-2025-63362 CRITICAL POC Act Now

Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway Firmware V3.1.1.0: HW 4.3.2.1: Webpage V7.04T.07.002880.0301 allows attackers to set the Administrator password and username as blank values, allowing attackers to bypass authentication.

Authentication Bypass
NVD
CVSS 3.1
9.8
EPSS
0.2%
CVE-2025-9286 CRITICAL Act Now

Privilege escalation in Appy Pie Connect for WooCommerce via password reset.

Privilege Escalation WordPress
NVD
CVSS 3.1
9.8
EPSS
0.2%
CVE-2025-10159 CRITICAL This Week

An authentication bypass vulnerability allows remote attackers to gain administrative privileges on Sophos AP6 Series Wireless Access Points older than firmware version 1.7.2563 (MR7). Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-30458
EPSS 0% CVSS 9.1
CRITICAL Act Now

Daylight Studio FuelCMS v1.5.2 allows remote attackers to exfiltrate password reset tokens through a mail splitting attack, enabling account takeover without authentication. The vulnerability exploits improper handling of email headers during the password reset workflow, permitting attackers to intercept or redirect sensitive reset tokens to attacker-controlled addresses. No public exploit code or active exploitation has been independently confirmed at time of analysis.

Information Disclosure
NVD GitHub
CVE-2026-27757
EPSS 0% CVSS 7.1
HIGH This Week

Sl902-Swtgw124As Firmware versions up to 200.1.20 contains a vulnerability that allows attackers to change account passwords without verifying the current password (CVSS 7.1).

Information Disclosure Sl902 Swtgw124as Firmware
NVD
CVE-2026-24443
EPSS 0% CVSS 8.8
HIGH This Week

Eventsentry versions up to 6.0.1.20 contains a vulnerability that allows attackers to privilege escalation (CVSS 8.8).

Privilege Escalation Eventsentry
NVD
CVE-2026-2543
EPSS 0% CVSS 2.7
LOW Monitor

A vulnerability was identified in vichan-devel vichan versions up to 5.1.5. contains a security vulnerability (CVSS 2.7).

PHP
NVD GitHub VulDB
CVE-2026-24440
EPSS 0% CVSS 8.8
HIGH This Week

Unauthenticated password modification in Tenda W30E V2 firmware through the maintenance interface allows authenticated users to reset account credentials without password verification, potentially enabling privilege escalation or account takeover on affected devices. The vulnerability affects firmware versions up to V16.01.0.19(5037) and currently lacks an available patch.

Authentication Bypass W30e Firmware
NVD
CVE-2025-14751
EPSS 0%
Monitor

A low-privileged user can bypass account credentials without confirming the user's current authentication state, which may lead to unauthorized privilege escalation.

Privilege Escalation
NVD
CVE-2025-11235
EPSS 0% CVSS 3.7
LOW Monitor

Unverified Password Change vulnerability in Progress MOVEit Transfer on Windows (REST API modules).This issue affects MOVEit Transfer: from 2023.1.0 before 2023.1.3, from 2023.0.0 before 2023.0.8, from 2022.1.0 before 2022.1.11, from 2022.0.0 before 2022.0.10. [CVSS 3.7 LOW]

Windows
NVD
CVE-2025-63362
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway Firmware V3.1.1.0: HW 4.3.2.1: Webpage V7.04T.07.002880.0301 allows attackers to set the Administrator password and username as blank values, allowing attackers to bypass authentication.

Authentication Bypass
NVD
CVE-2025-9286
EPSS 0% CVSS 9.8
CRITICAL Act Now

Privilege escalation in Appy Pie Connect for WooCommerce via password reset.

Privilege Escalation WordPress
NVD
CVE-2025-10159
EPSS 0% CVSS 9.8
CRITICAL This Week

An authentication bypass vulnerability allows remote attackers to gain administrative privileges on Sophos AP6 Series Wireless Access Points older than firmware version 1.7.2563 (MR7). Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy