CVE-2025-22144

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-22144
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-22144.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-22144
Related
  • GHSA-p883-7496-x35p
Published
2025-01-13T20:15:29Z
Modified
2025-05-17T14:24:30.896945Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

NamelessMC is a free, easy to use & powerful website software for Minecraft servers. A user with admincp.core.emails or admincp.users.edit permissions can validate users and an attacker can reset their password. When the account is successfully approved by email the reset code is NULL, but when the account is manually validated by a user with admincp.core.emails or admincp.users.edit permissions then the resetcode will no longer be NULL but empty. An attacker can request http://localhost/nameless/index.php?route=/forgotpassword/&c= and reset the password. As a result an attacker may compromise another users password and take over their account. This issue has been addressed in release version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/namelessmc/nameless

Affected ranges

Type
GIT
Repo
https://github.com/namelessmc/nameless
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v2.*

v2.0.0
v2.0.0-pr1
v2.0.0-pr10
v2.0.0-pr11
v2.0.0-pr12
v2.0.0-pr13
v2.0.0-pr2
v2.0.0-pr3
v2.0.0-pr4
v2.0.0-pr5
v2.0.0-pr6
v2.0.0-pr7
v2.0.0-pr8
v2.0.0-pr9
v2.0.1
v2.0.2
v2.0.3
v2.1.0
v2.1.1
v2.1.2