Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67719: CWE-620: Unverified Password Change in ibexa user

0
High
VulnerabilityCVE-2025-67719cvecve-2025-67719cwe-620
Published: Thu Dec 11 2025 (12/11/2025, 01:16:15 UTC)
Source: CVE Database V5
Vendor/Project: ibexa
Product: user

Description

Ibexa is a composable end-to-end DXP (Digital Experience Platform). Versions 5.0.0-beta1 through 5.0.3 do not have password validation. During the transition from v4 to v5 an error was introduced into validation code which causes the validation of the previous password not to run as expected. This makes it possible for a logged in user to change their password in the back office without knowing the previous password. For example, if a user logs into their account and walks away without locking their workstation, an attacker could access the unattended session and change the password, therefore locking the legitimate user out. This issue is fixed in version 5.0.4.

AI-Powered Analysis

AILast updated: 12/11/2025, 02:17:01 UTC

Technical Analysis

CVE-2025-67719 is a vulnerability classified under CWE-620 (Unverified Password Change) affecting Ibexa's user management component in versions from 5.0.0-beta1 up to but not including 5.0.4. During the upgrade from version 4 to 5, a regression was introduced that bypasses the validation of the current password when a logged-in user attempts to change their password in the back-office interface. This means that any authenticated user can change their password without supplying the previous password, undermining the integrity of the authentication process. The vulnerability does not require elevated privileges beyond a valid user session, nor does it require user interaction beyond the password change action itself. The attack vector is local (AV:L), meaning the attacker must have access to an active session on the system, such as through an unattended workstation or hijacked session. The CVSS 4.0 score is 8.5 (high), reflecting the significant impact on confidentiality and integrity, as an attacker can lock out legitimate users by changing their passwords. No known exploits are currently reported in the wild. The issue is resolved in Ibexa version 5.0.4, where proper password validation is restored. This vulnerability primarily impacts organizations relying on Ibexa for digital experience management, especially those with insufficient session management or workstation security policies.

Potential Impact

For European organizations, this vulnerability poses a risk of account lockout and potential denial of access to critical back-office systems managing digital experiences, content, and customer interactions. Attackers with physical or remote access to an active user session can change passwords without knowing the original credentials, leading to potential operational disruptions and loss of control over user accounts. This can affect service availability, user trust, and compliance with data protection regulations such as GDPR if unauthorized access leads to data exposure or service interruption. Organizations with shared workstations, insufficient session timeout policies, or lax physical security controls are particularly vulnerable. The impact extends to reputational damage and potential financial losses due to downtime or recovery efforts. Since Ibexa is used by enterprises for customer-facing platforms, disruption can also affect end-user experience and business continuity.

Mitigation Recommendations

1. Upgrade all Ibexa installations to version 5.0.4 or later immediately to ensure the password validation bug is fixed. 2. Enforce strict session management policies, including automatic session timeouts and mandatory workstation locking when unattended. 3. Implement multi-factor authentication (MFA) to reduce risk from compromised sessions. 4. Monitor logs for unusual password change activities and implement alerts for rapid response. 5. Educate users on the importance of locking their workstations when stepping away. 6. Restrict physical access to systems where Ibexa back-office is accessed. 7. Consider additional application-level controls such as IP restrictions or device fingerprinting to limit session hijacking risks. 8. Conduct regular audits of user accounts and password changes to detect anomalies early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-10T18:46:14.762Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693a262ebbbecd30a6f23ccd

Added to database: 12/11/2025, 2:02:22 AM

Last enriched: 12/11/2025, 2:17:01 AM

Last updated: 12/11/2025, 6:33:35 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats