Vulnerability Details : CVE-2022-30935
An authorization bypass in b2evolution allows remote, unauthenticated attackers to predict password reset tokens for any user through the use of a bad randomness function. This allows the attacker to get valid sessions for arbitrary users, and optionally reset their password. Tested and confirmed in a default installation of version 7.2.3. Earlier versions are affected, possibly earlier major versions as well.
Products affected by CVE-2022-30935
- cpe:2.3:a:b2evolution:b2evolution:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-30935
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 49 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-30935
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.1
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
3.9
|
5.2
|
NIST |
CWE ids for CVE-2022-30935
-
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-30935
-
https://b2evolution.net/downloads/7-2-5-stable
7.2.5-stablePatch;Vendor Advisory
-
https://github.com/b2evolution/b2evolution/issues/114
Potentially severe security flaw · Issue #114 · b2evolution/b2evolution · GitHubIssue Tracking;Third Party Advisory
-
https://github.com/b2evolution/b2evolution/blob/master/inc/_core/_misc.funcs.php#L5955
Patch;Third Party Advisory
Jump to