FKIE_CVE-2026-3186
Vulnerability from fkie_nvd - Published: 2026-02-25 14:16 - Updated: 2026-02-26 15:53
Severity ?
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Summary
A vulnerability was determined in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this vulnerability is an unknown functionality of the file /api/admin/sys-user/reset/password/ of the component Password Reset Handler. This manipulation of the argument userId causes use of default password. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.3.3-beta addresses this issue. Patch name: aefaabfd7527188bfba3c8c9eee17c316d094802. It is suggested to upgrade the affected component. The project was informed beforehand and acted very professional: "We have added authorization validation to the password reset interface; now only users with the corresponding permissions are allowed to perform password resets."
References
| URL | Tags | ||
|---|---|---|---|
| cna@vuldb.com | https://github.com/feiyuchuixue/sz-boot-parent/ | Product | |
| cna@vuldb.com | https://github.com/feiyuchuixue/sz-boot-parent/commit/aefaabfd7527188bfba3c8c9eee17c316d094802 | Patch | |
| cna@vuldb.com | https://github.com/feiyuchuixue/sz-boot-parent/releases/tag/v1.3.3-beta | Release Notes | |
| cna@vuldb.com | https://github.com/yuccun/CVE/blob/main/sz-boot-parent-VPE_Unauthorized_Password_Reset.md | Exploit, Third Party Advisory | |
| cna@vuldb.com | https://vuldb.com/?ctiid.347744 | Permissions Required, Third Party Advisory, VDB Entry | |
| cna@vuldb.com | https://vuldb.com/?id.347744 | Third Party Advisory, VDB Entry | |
| cna@vuldb.com | https://vuldb.com/?submit.754037 | Third Party Advisory, VDB Entry |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| szadmin | sz-boot-parent | * | |
| szadmin | sz-boot-parent | 1.0.0 | |
| szadmin | sz-boot-parent | 1.0.1 | |
| szadmin | sz-boot-parent | 1.0.2 | |
| szadmin | sz-boot-parent | 1.1.0 | |
| szadmin | sz-boot-parent | 1.2.0 | |
| szadmin | sz-boot-parent | 1.2.1 | |
| szadmin | sz-boot-parent | 1.2.2 | |
| szadmin | sz-boot-parent | 1.2.3 | |
| szadmin | sz-boot-parent | 1.2.4 | |
| szadmin | sz-boot-parent | 1.2.5 | |
| szadmin | sz-boot-parent | 1.2.6 | |
| szadmin | sz-boot-parent | 1.3.0 | |
| szadmin | sz-boot-parent | 1.3.1 | |
| szadmin | sz-boot-parent | 1.3.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:szadmin:sz-boot-parent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "772E4F24-5681-43E1-827D-7D658095EE1B",
"versionEndIncluding": "0.9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:szadmin:sz-boot-parent:1.0.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "5DCA4854-7694-4BFD-A807-9278EE352082",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:szadmin:sz-boot-parent:1.0.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "ABF1A941-C021-4033-90BC-A99BD26701FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:szadmin:sz-boot-parent:1.0.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "1E097731-97A4-4B7F-BF2F-7D6825C49223",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:szadmin:sz-boot-parent:1.1.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "94FCFB0C-EBCC-4683-B982-D8F5D4C063BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:szadmin:sz-boot-parent:1.2.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "708EA3F9-1375-4487-A909-5E842E5C8DE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:szadmin:sz-boot-parent:1.2.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "D3BF7ADA-3266-4D00-81E7-D4A473ECD85C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:szadmin:sz-boot-parent:1.2.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "BAD95B7F-9E78-41D2-A071-F27AB7236D3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:szadmin:sz-boot-parent:1.2.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "0F2DCD07-5D33-48E2-A6EA-67CABDFC1249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:szadmin:sz-boot-parent:1.2.4:beta:*:*:*:*:*:*",
"matchCriteriaId": "17F8D76C-D418-4945-ADD5-0AAE1FD903FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:szadmin:sz-boot-parent:1.2.5:beta:*:*:*:*:*:*",
"matchCriteriaId": "0FE66DC8-32C7-4D45-B069-8A9F75A777FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:szadmin:sz-boot-parent:1.2.6:beta:*:*:*:*:*:*",
"matchCriteriaId": "53D904ED-B71A-4B59-A5FE-DE3D7A37794A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:szadmin:sz-boot-parent:1.3.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "F266024B-C11B-480E-A474-37B21885B1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:szadmin:sz-boot-parent:1.3.1:beta:*:*:*:*:*:*",
"matchCriteriaId": "C581B825-A425-49FF-8420-1104026D4093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:szadmin:sz-boot-parent:1.3.2:beta:*:*:*:*:*:*",
"matchCriteriaId": "818F48CE-57CA-4253-966D-A9B5041343C2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was determined in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this vulnerability is an unknown functionality of the file /api/admin/sys-user/reset/password/ of the component Password Reset Handler. This manipulation of the argument userId causes use of default password. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.3.3-beta addresses this issue. Patch name: aefaabfd7527188bfba3c8c9eee17c316d094802. It is suggested to upgrade the affected component. The project was informed beforehand and acted very professional: \"We have added authorization validation to the password reset interface; now only users with the corresponding permissions are allowed to perform password resets.\""
},
{
"lang": "es",
"value": "Una vulnerabilidad fue determinada en feiyuchuixue sz-boot-parent hasta 1.3.2-beta. Afectada por esta vulnerabilidad es una funcionalidad desconocida del archivo /api/admin/sys-user/reset/password/ del componente Gestor de Restablecimiento de Contrase\u00f1a. Esta manipulaci\u00f3n del argumento userId causa el uso de contrase\u00f1a por defecto. El ataque puede ser iniciado remotamente. El exploit ha sido divulgado p\u00fablicamente y puede ser utilizado. La actualizaci\u00f3n a la versi\u00f3n 1.3.3-beta aborda este problema. Nombre del parche: aefaabfd7527188bfba3c8c9eee17c316d094802. Se sugiere actualizar el componente afectado. El proyecto fue informado de antemano y actu\u00f3 de manera muy profesional: \u0027Hemos a\u00f1adido validaci\u00f3n de autorizaci\u00f3n a la interfaz de restablecimiento de contrase\u00f1a; ahora solo los usuarios con los permisos correspondientes pueden realizar restablecimientos de contrase\u00f1a.\u0027"
}
],
"id": "CVE-2026-3186",
"lastModified": "2026-02-26T15:53:14.073",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "cna@vuldb.com",
"type": "Secondary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4,
"source": "cna@vuldb.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "PROOF_OF_CONCEPT",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "cna@vuldb.com",
"type": "Secondary"
}
]
},
"published": "2026-02-25T14:16:21.767",
"references": [
{
"source": "cna@vuldb.com",
"tags": [
"Product"
],
"url": "https://github.com/feiyuchuixue/sz-boot-parent/"
},
{
"source": "cna@vuldb.com",
"tags": [
"Patch"
],
"url": "https://github.com/feiyuchuixue/sz-boot-parent/commit/aefaabfd7527188bfba3c8c9eee17c316d094802"
},
{
"source": "cna@vuldb.com",
"tags": [
"Release Notes"
],
"url": "https://github.com/feiyuchuixue/sz-boot-parent/releases/tag/v1.3.3-beta"
},
{
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yuccun/CVE/blob/main/sz-boot-parent-VPE_Unauthorized_Password_Reset.md"
},
{
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?ctiid.347744"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?id.347744"
},
{
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://vuldb.com/?submit.754037"
}
],
"sourceIdentifier": "cna@vuldb.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1393"
}
],
"source": "cna@vuldb.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…