GHSA-J6G5-P62X-58HW
Vulnerability from github – Published: 2025-06-12 23:00 – Updated: 2025-06-12 23:02
VLAI?
Summary
vantage6 lacks brute-force protection on change password functionality
Details
Impact
If attacker gets access to an authenticated session, they can try to brute-force the user password by using the change password functionality: they can call that route infinitely which will return the message that password is wrong until it is correct
Patches
This issue has been patched in version 4.11.0
Workarounds
None
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "vantage6"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.11.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-43863"
],
"database_specific": {
"cwe_ids": [
"CWE-307"
],
"github_reviewed": true,
"github_reviewed_at": "2025-06-12T23:00:41Z",
"nvd_published_at": "2025-06-12T18:15:20Z",
"severity": "LOW"
},
"details": "### Impact\nIf attacker gets access to an authenticated session, they can try to brute-force the user password by using the change password functionality: they can call that route infinitely which will return the message that password is wrong until it is correct\n\n### Patches\nThis issue has been patched in version 4.11.0\n\n### Workarounds\nNone",
"id": "GHSA-j6g5-p62x-58hw",
"modified": "2025-06-12T23:02:07Z",
"published": "2025-06-12T23:00:41Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/vantage6/vantage6/security/advisories/GHSA-j6g5-p62x-58hw"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43863"
},
{
"type": "WEB",
"url": "https://github.com/vantage6/vantage6/commit/e0f1841b310f6f610e8137db2506cf683ce154d0"
},
{
"type": "PACKAGE",
"url": "https://github.com/vantage6/vantage6"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U",
"type": "CVSS_V4"
}
],
"summary": "vantage6 lacks brute-force protection on change password functionality"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…