Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25858: CWE-640 Weak Password Recovery Mechanism for Forgotten Password in macrozheng mall

0
Critical
VulnerabilityCVE-2026-25858cvecve-2026-25858cwe-640
Published: Sat Feb 07 2026 (02/07/2026, 21:45:41 UTC)
Source: CVE Database V5
Vendor/Project: macrozheng
Product: mall

Description

macrozheng mall version 1.0.3 and prior contains an authentication vulnerability in the mall-portal password reset workflow that allows an unauthenticated attacker to reset arbitrary user account passwords using only a victim’s telephone number. The password reset flow exposes the one-time password (OTP) directly in the API response and validates password reset requests solely by comparing the provided OTP to a value stored by telephone number, without verifying user identity or ownership of the telephone number. This enables remote account takeover of any user with a known or guessable telephone number.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 09:23:13 UTC

Technical Analysis

CVE-2026-25858 is a critical authentication vulnerability affecting macrozheng mall versions 1.0.3 and prior. The vulnerability arises from a weak password recovery mechanism in the mall-portal password reset workflow. Specifically, the system allows an unauthenticated attacker to initiate a password reset by submitting a victim's telephone number. The API response directly exposes the one-time password (OTP) used for verification, and the backend validates the reset request by simply comparing the provided OTP against a stored value indexed by the telephone number. Crucially, there is no verification of the user's identity or confirmation that the attacker controls the telephone number in question. This design flaw enables attackers to reset passwords for any user account with a known or guessable phone number, effectively allowing remote account takeover without requiring authentication or user interaction. The vulnerability is classified under CWE-640 (Weak Password Recovery Mechanism), highlighting the improper implementation of password reset controls. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N) reflects that the attack is network-based, requires no privileges or user interaction, and results in high confidentiality and integrity impact due to unauthorized account access. Although no public exploits have been reported yet, the simplicity of exploitation and severity of impact make this a critical threat for affected users and organizations.

Potential Impact

The primary impact of CVE-2026-25858 is unauthorized remote account takeover, which compromises user confidentiality and integrity. Attackers can reset passwords and gain full access to victim accounts, potentially leading to data theft, fraudulent transactions, or further lateral attacks within the affected system. For organizations, this can result in significant reputational damage, regulatory penalties, and loss of customer trust. Since the vulnerability requires only knowledge or guessing of a telephone number, large user bases with publicly available or guessable phone numbers are at high risk. The lack of authentication or user verification in the reset process means attackers can automate mass account compromises. Additionally, compromised accounts could be used to escalate privileges or distribute malware, amplifying the threat. The vulnerability affects all users of macrozheng mall version 1.0.3 and earlier, potentially impacting e-commerce operations relying on this platform worldwide.

Mitigation Recommendations

To mitigate CVE-2026-25858, organizations should immediately update the password reset workflow to enforce strong user identity verification. This includes: 1) Removing OTP exposure from API responses to prevent attackers from obtaining verification codes. 2) Implementing multi-factor verification methods, such as sending OTPs only to verified contact channels and requiring user confirmation. 3) Validating ownership of the telephone number through out-of-band verification or additional identity proofing before allowing password resets. 4) Rate limiting password reset requests per telephone number and IP address to prevent brute force or enumeration attacks. 5) Logging and monitoring password reset attempts for suspicious activity. 6) Encouraging users to register multiple verified contact methods and enabling account recovery options that require stronger authentication. 7) Applying patches or updates from macrozheng once available, or deploying custom fixes to address the flawed logic. 8) Educating users about phishing and social engineering risks related to password resets. These measures collectively reduce the risk of unauthorized account takeovers and improve overall authentication security.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-06T19:12:03.463Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6987b5ecf9fa50a62fd2db09

Added to database: 2/7/2026, 10:00:12 PM

Last enriched: 3/5/2026, 9:23:13 AM

Last updated: 3/25/2026, 10:18:17 AM

Views: 228

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses