Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63800: n/a

0
High
VulnerabilityCVE-2025-63800cvecve-2025-63800
Published: Tue Nov 18 2025 (11/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The password change endpoint in Open Source Point of Sale 3.4.1 allows users to set their account password to an empty string due to missing server-side validation. When an authenticated user omits or leaves the `password` and `repeat_password` parameters empty in the password change request, the backend still returns a successful response and sets the password to an empty string. This effectively disables authentication and may allow unauthorized access to user or administrative accounts.

AI-Powered Analysis

AILast updated: 11/18/2025, 16:26:25 UTC

Technical Analysis

CVE-2025-63800 is a security vulnerability identified in Open Source Point of Sale (POS) version 3.4.1. The issue arises from the password change endpoint, which does not perform adequate server-side validation on the 'password' and 'repeat_password' parameters during a password update request. When an authenticated user submits a password change request with these parameters empty or omitted, the backend erroneously accepts the request, sets the account password to an empty string, and returns a successful response. This behavior effectively disables the authentication mechanism for the affected account, as an empty password may allow bypassing normal login procedures or facilitate unauthorized access. The vulnerability requires the attacker to be authenticated, meaning they must have legitimate access to the account initially, but no further user interaction or elevated privileges are necessary to exploit it. Although no known exploits are reported in the wild, the flaw poses a significant risk because it compromises account security and could be leveraged for privilege escalation or lateral movement within the POS environment. The vulnerability impacts the confidentiality and integrity of user accounts and could lead to unauthorized access to sensitive retail or transactional data. The lack of a CVSS score necessitates an assessment based on the nature of the flaw, which indicates a high severity due to the critical impact on authentication and potential for misuse. The vulnerability is particularly relevant to organizations relying on Open Source POS 3.4.1, commonly used in retail and hospitality sectors, where compromised accounts could disrupt operations and lead to data breaches.

Potential Impact

For European organizations, especially those in retail, hospitality, and other sectors using Open Source POS 3.4.1, this vulnerability presents a significant risk. Exploitation can lead to unauthorized access to user and administrative accounts, potentially allowing attackers to manipulate sales data, access sensitive customer information, or disrupt business operations. The ability to set an empty password undermines authentication controls, increasing the likelihood of account takeover and privilege escalation. This could result in financial losses, reputational damage, and regulatory compliance issues under GDPR due to unauthorized data access. The operational disruption in point-of-sale systems can also affect customer trust and business continuity. Given the widespread use of POS systems in European retail markets, the vulnerability could have a broad impact if not promptly addressed.

Mitigation Recommendations

Organizations should immediately audit their Open Source POS deployments to identify affected versions and accounts with empty or weak passwords. Implement strict server-side validation to reject password change requests where the 'password' or 'repeat_password' fields are empty or do not meet complexity requirements. Until an official patch is released, consider disabling the password change functionality or restricting it to trusted administrators. Enforce multi-factor authentication (MFA) for all administrative and sensitive user accounts to reduce the risk of unauthorized access. Regularly monitor logs for unusual password change activities and conduct security awareness training for users about secure password practices. Additionally, maintain up-to-date backups and have an incident response plan ready to address potential breaches stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691c9c359b9483ee9a7975ad

Added to database: 11/18/2025, 4:17:57 PM

Last enriched: 11/18/2025, 4:26:25 PM

Last updated: 11/19/2025, 4:27:09 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats