Home

Description

EN DE

A vulnerability, which was classified as problematic, has been found in fossasia open-event-server 1.19.1. This issue affects the function send_email_change_user_email of the file /fossasia/open-event-server/blob/development/app/api/helpers/mail.py of the component Mail Verification Handler. The manipulation leads to reliance on obfuscation or encryption of security-relevant inputs without integrity checking. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Eine Schwachstelle wurde in fossasia open-event-server 1.19.1 entdeckt. Sie wurde als problematisch eingestuft. Betroffen davon ist die Funktion send_email_change_user_email der Datei /fossasia/open-event-server/blob/development/app/api/helpers/mail.py der Komponente Mail Verification Handler. Durch das Manipulieren mit unbekannten Daten kann eine reliance on obfuscation or encryption of security-relevant inputs without integrity checking-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Die Ausnutzbarkeit gilt als schwierig. Der Exploit steht zur öffentlichen Verfügung.

PUBLISHED Reserved 2025-05-29 | Published 2025-05-29 | Updated 2025-05-29 | Assigner VulDB




MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
LOW: 3.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
LOW: 3.7CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
2.6AV:N/AC:H/Au:N/C:N/I:P/A:N

Problem types

Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking

Missing Cryptographic Step

Product status

1.19.1
affected

Timeline

2025-05-29:Advisory disclosed
2025-05-29:VulDB entry created
2025-05-29:VulDB entry last update

Credits

Gavin Zhong (VulDB User) reporter

References

gist.github.com/...rboy-zjc/31ecea91b304b8dd9871ad507467ca61 exploit

vuldb.com/?id.310493 (VDB-310493 | fossasia open-event-server Mail Verification mail.py send_email_change_user_email reliance on obfuscation or encryption of security-relevant inputs without integrity checking) vdb-entry technical-description

vuldb.com/?ctiid.310493 (VDB-310493 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.580256 (Submit #580256 | open-event-server v1.19.1 Reliance on Obfuscation or Encryption of Security-Relevant Input) third-party-advisory

gist.github.com/...rboy-zjc/31ecea91b304b8dd9871ad507467ca61 related

gist.github.com/...rboy-zjc/31ecea91b304b8dd9871ad507467ca61 exploit

cve.org (CVE-2025-5323)

nvd.nist.gov (CVE-2025-5323)

Download JSON