Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2543: Unverified Password Change in vichan-devel vichan

0
Medium
VulnerabilityCVE-2026-2543cvecve-2026-2543
Published: Mon Feb 16 2026 (02/16/2026, 07:02:06 UTC)
Source: CVE Database V5
Vendor/Project: vichan-devel
Product: vichan

Description

A vulnerability was identified in vichan-devel vichan up to 5.1.5. This vulnerability affects unknown code of the file inc/mod/pages.php of the component Password Change Handler. The manipulation of the argument Password leads to unverified password change. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:18:51 UTC

Technical Analysis

CVE-2026-2543 is a vulnerability identified in the vichan-devel vichan software, affecting versions 5.1.0 through 5.1.5. The issue resides in the Password Change Handler component, specifically within the inc/mod/pages.php file. The vulnerability allows an attacker to manipulate the password argument during a password change request, resulting in an unverified password change. This means the system does not properly validate or authenticate the legitimacy of the password change request, enabling an attacker with sufficient privileges to change passwords remotely without proper authorization checks. The vulnerability is exploitable remotely and does not require user interaction. However, the CVSS vector indicates that the attacker must have high privileges (PR:H) to exploit this flaw, which limits the scope of exploitation to users who already have elevated access. The vulnerability does not impact confidentiality or availability directly but affects integrity by allowing unauthorized password modifications. The vendor was contacted but has not responded or issued a patch, and no known exploits have been observed in the wild. Given the lack of vendor response and patch availability, organizations using affected versions of vichan should consider alternative mitigation strategies or upgrade paths. The CVSS 4.0 base score is 5.1, categorizing this vulnerability as medium severity. The vulnerability's exploitation could lead to account takeovers or privilege escalations within the affected system, undermining trust and security of user accounts.

Potential Impact

The primary impact of CVE-2026-2543 is unauthorized password changes within vichan installations, potentially leading to account takeover or privilege escalation. Since the vulnerability requires high privileges for exploitation, the risk is somewhat contained to users who already have elevated access, such as administrators or moderators. However, if an attacker gains such privileges through other means, this vulnerability could be leveraged to further compromise the system by changing passwords of other users, including administrators. This could result in loss of control over the forum or imageboard, data integrity issues, and potential misuse of accounts for malicious activities such as spreading misinformation or malware. The lack of vendor response and patch availability increases the risk of exploitation over time. Organizations relying on vichan for community management or content hosting may face reputational damage, user trust erosion, and operational disruptions if this vulnerability is exploited. The medium severity rating reflects moderate risk but highlights the importance of addressing the issue promptly to prevent escalation.

Mitigation Recommendations

1. Restrict access to the password change functionality to only trusted and verified users with necessary privileges, minimizing exposure. 2. Implement additional access controls or multi-factor authentication (MFA) for users with high privileges to reduce the risk of account compromise. 3. Monitor logs for unusual password change activities, especially those initiated remotely or by privileged accounts. 4. If possible, review and modify the vulnerable code in inc/mod/pages.php to add proper verification and authentication checks before processing password changes. 5. Consider isolating or sandboxing the vichan application environment to limit potential damage from compromised accounts. 6. Stay alert for any vendor updates or community patches addressing this vulnerability and apply them promptly once available. 7. Evaluate alternative software solutions or upgrade paths if vendor support remains unavailable. 8. Educate administrators and moderators about the risk and encourage strong password policies and regular audits of privileged accounts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T15:51:48.549Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6992c4f0bda29fb02f53b417

Added to database: 2/16/2026, 7:19:12 AM

Last enriched: 2/23/2026, 9:18:51 PM

Last updated: 4/6/2026, 8:30:08 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses