Vulnerability Details : CVE-2023-38877
Potential exploit
A host header injection vulnerability exists in gugoan's Economizzer v.0.9-beta1 and commit 3730880 (April 2023). By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This allows an attacker to reset other users' passwords.
Products affected by CVE-2023-38877
- cpe:2.3:a:economizzer:economizzer:0.9:beta1:*:*:*:wordpress:*:*
- cpe:2.3:a:economizzer:economizzer:april_2023:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-38877
0.45%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 62 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-38877
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2023-38877
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-38877
-
https://github.com/gugoan/economizzer/
GitHub - gugoan/economizzer: Open Source Personal Finance ManagerProduct
-
https://github.com/dub-flow/vulnerability-research/tree/main/CVE-2023-38877
vulnerability-research/CVE-2023-38877 at main · dub-flow/vulnerability-research · GitHubExploit;Third Party Advisory
-
https://www.economizzer.org
Economizzer - Open Source Personal Finance ManagerProduct
Jump to