We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-6533

xxyopen/201206030 novel-plus CATCHA LoginController.java ajaxLogin authentication replay



Description

EN DE

A vulnerability, which was classified as critical, has been found in xxyopen/201206030 novel-plus up to 5.1.3. Affected by this issue is the function ajaxLogin of the file novel-admin/src/main/java/com/java2nb/system/controller/LoginController.java of the component CATCHA Handler. The manipulation leads to authentication bypass by capture-replay. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Eine kritische Schwachstelle wurde in xxyopen/201206030 novel-plus bis 5.1.3 entdeckt. Dies betrifft die Funktion ajaxLogin der Datei novel-admin/src/main/java/com/java2nb/system/controller/LoginController.java der Komponente CATCHA Handler. Durch das Beeinflussen mit unbekannten Daten kann eine authentication bypass by capture-replay-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Die Komplexität eines Angriffs ist eher hoch. Sie ist schwierig ausnutzbar. Der Exploit steht zur öffentlichen Verfügung.

Reserved 2025-06-23 | Published 2025-06-24 | Updated 2025-06-24 | Assigner VulDB


MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.6CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 5.6CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
5.1AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Authentication Bypass by Capture-replay

Improper Authentication

Product status

5.1.0
affected

5.1.1
affected

5.1.2
affected

5.1.3
affected

5.1.0
affected

5.1.1
affected

5.1.2
affected

5.1.3
affected

Timeline

2025-06-23:Advisory disclosed
2025-06-23:VulDB entry created
2025-06-23:VulDB entry last update

Credits

bpy9ft (VulDB User) reporter

References

vuldb.com/?id.313652 (VDB-313652 | xxyopen/201206030 novel-plus CATCHA LoginController.java ajaxLogin authentication replay) vdb-entry technical-description

vuldb.com/?ctiid.313652 (VDB-313652 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.596481 (Submit #596481 | xxyopen novel-plus 5.1.3 Improper Restriction of Excessive Authentication Attempts) third-party-advisory

blog.0xd00.com/...tack-lead-to-brute-force-protection-bypass related

blog.0xd00.com/...tack-lead-to-brute-force-protection-bypass exploit

cve.org (CVE-2025-6533)

nvd.nist.gov (CVE-2025-6533)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-6533

Support options

Helpdesk Chat, Email, Knowledgebase