A vulnerability in the password recovery flow could allow an unauthenticated attacker to perform actions on behalf of a user who initiates a password reset.
Users are affected if:
forgot-password functionality.Input validation and URL construction in the password recovery flow have been hardened.
Users should upgrade to v3.79.1 or later.
There are no complete workarounds. Upgrading to v3.79.1 is recommended.
{
"nvd_published_at": "2026-04-01T18:16:31Z",
"severity": "CRITICAL",
"github_reviewed": true,
"cwe_ids": [
"CWE-472",
"CWE-640"
],
"github_reviewed_at": "2026-04-01T16:08:02Z"
}