Home

Description

TitanSystems Zender v3.9.7 contains an account takeover vulnerability in its password reset functionality. A temporary password or reset token issued to one user can be used to log in as another user, due to improper validation of token-user linkage. This allows remote attackers to gain unauthorized access to any user account by exploiting the password reset mechanism. The vulnerability occurs because the reset token is not correctly bound to the requesting account and is accepted for other user emails during login, enabling privilege escalation and information disclosure.

PUBLISHED Reserved 2025-08-17 | Published 2025-09-30 | Updated 2025-10-01 | Assigner mitre

References

previews.titansystems.ph/zender/dashboard/auth

codecanyon.net/...ices-as-sms-gateway-saas-platform/26594230

darklotus.medium.com/...allows-account-takeover-2b5bcb50c762

cve.org (CVE-2025-56676)

nvd.nist.gov (CVE-2025-56676)

Download JSON