Home

Description

EN DE

A vulnerability has been found in macrozheng mall up to 1.0.3. This impacts an unknown function of the component Registration. Such manipulation leads to weak password requirements. The attack can be executed remotely. Attacks of this nature are highly complex. The exploitability is said to be difficult. The vendor deleted the GitHub issue for this vulnerability without and explanation.

In macrozheng mall bis 1.0.3 ist eine Schwachstelle entdeckt worden. Betroffen hiervon ist ein unbekannter Ablauf der Komponente Registration. Die Manipulation führt zu weak password requirements. Der Angriff kann remote ausgeführt werden. Das Durchführen eines Angriffs ist mit einer relativ hohen Komplexität verbunden. Das Ausnutzen gilt als schwierig.

PUBLISHED Reserved 2025-08-26 | Published 2025-08-27 | Updated 2025-08-27 | Assigner VulDB




MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X
LOW: 3.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:X/RL:X/RC:R
LOW: 3.7CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:X/RL:X/RC:R
2.6AV:N/AC:H/Au:N/C:P/I:N/A:N/E:ND/RL:ND/RC:UR

Problem types

Weak Password Requirements

Product status

1.0.0
affected

1.0.1
affected

1.0.2
affected

1.0.3
affected

Timeline

2025-08-26:Advisory disclosed
2025-08-26:VulDB entry created
2025-08-26:VulDB entry last update

Credits

ez-lbz (VulDB User) reporter

References

vuldb.com/?id.321507 (VDB-321507 | macrozheng mall Registration weak password) vdb-entry

vuldb.com/?ctiid.321507 (VDB-321507 | CTI Indicators (IOB, IOC, TTP)) signature permissions-required

vuldb.com/?submit.635503 (Submit #635503 | macrozheng mall ≤ v1.0.3 CWE-521) third-party-advisory

github.com/macrozheng/mall/issues/923 issue-tracking

cve.org (CVE-2025-9514)

nvd.nist.gov (CVE-2025-9514)

Download JSON