An issue has been discovered in Taguette versions prior to 1.5.0. It was possible for an attacker to request password reset email containing a malicious link, allowing the attacker to set the email if clicked by the victim.
Users should upgrade to Taguette 1.5.0.
{
"github_reviewed": true,
"nvd_published_at": "2025-10-20T20:15:37Z",
"cwe_ids": [
"CWE-15"
],
"github_reviewed_at": "2025-10-20T20:08:45Z",
"severity": "HIGH"
}