Home

Description

Data Center Audit 2.6.2 contains a cross-site request forgery vulnerability that allows attackers to reset administrator passwords without authentication by submitting crafted POST requests. Attackers can send requests to dca_resetpw.php with parameters updateuser, pass, pass2, and submit_reset to change the admin account password and gain administrative access.

PUBLISHED Reserved 2026-03-06 | Published 2026-03-06 | Updated 2026-03-09 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

Cross-Site Request Forgery (CSRF)

Product status

2.6.2
affected

Credits

Ihsan Sencan finder

References

www.exploit-db.com/exploits/45831 (ExploitDB-45831) exploit

www.vulncheck.com/...site-request-forgery-via-dca-resetpwphp (VulnCheck Advisory: Data Center Audit 2.6.2 Cross-Site Request Forgery via dca_resetpw.php) third-party-advisory

cve.org (CVE-2018-25177)

nvd.nist.gov (CVE-2018-25177)

Download JSON