Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28213: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in evershopcommerce evershop

0
Critical
VulnerabilityCVE-2026-28213cvecve-2026-28213cwe-200cwe-640
Published: Thu Feb 26 2026 (02/26/2026, 22:31:47 UTC)
Source: CVE Database V5
Vendor/Project: evershopcommerce
Product: evershop

Description

EverShop is a TypeScript-first eCommerce platform. Versions prior to 2.1.1 have a vulnerability in the "Forgot Password" functionality. When specifying a target email address, the API response returns the password reset token. This allows an attacker to take over the associated account. Version 2.1.1 fixes the issue.

AI-Powered Analysis

AILast updated: 02/26/2026, 23:10:46 UTC

Technical Analysis

CVE-2026-28213 is a critical security vulnerability affecting EverShop, a TypeScript-first eCommerce platform. The vulnerability resides in the 'Forgot Password' functionality present in versions prior to 2.1.1. When an attacker submits a password reset request specifying a target email address, the API erroneously returns the password reset token in the response. This token is intended to be confidential and used only in a secure password reset flow. By exposing this token directly in the API response without authentication or user interaction, the vulnerability allows any remote attacker to retrieve the token and reset the password for the targeted account. This leads to a complete account takeover, compromising confidentiality, integrity, and availability of user accounts. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information) and CWE-640 (Weak Password Recovery Mechanism). The CVSS v3.1 base score is 9.8 (Critical), reflecting the ease of exploitation (network vector, no privileges or user interaction required) and the severe impact on affected systems. The flaw was publicly disclosed on February 26, 2026, and fixed in EverShop version 2.1.1. No known exploits in the wild have been reported yet, but the critical nature demands immediate remediation.

Potential Impact

The impact of CVE-2026-28213 is severe for organizations using vulnerable versions of EverShop. Attackers can remotely and anonymously obtain password reset tokens, enabling them to take over user accounts without any user interaction or authentication. This compromises user confidentiality and allows attackers to manipulate account data, perform fraudulent transactions, or escalate privileges within the eCommerce platform. The breach of customer accounts can lead to financial losses, reputational damage, and regulatory penalties due to exposure of personal and payment information. Additionally, attackers gaining control over administrative or merchant accounts could disrupt service availability or inject malicious content. Given EverShop's role in managing eCommerce operations, the vulnerability poses a significant risk to business continuity and customer trust worldwide.

Mitigation Recommendations

To mitigate CVE-2026-28213, organizations should immediately upgrade EverShop to version 2.1.1 or later, where the vulnerability is patched. Until the upgrade is applied, restrict access to the password reset API endpoint using network-level controls such as IP whitelisting or web application firewalls (WAF) with custom rules to detect and block abnormal password reset requests. Implement monitoring and alerting for unusual password reset activity, including multiple reset requests for the same account or from suspicious IP addresses. Review and enhance password reset workflows to ensure tokens are never exposed in API responses and are delivered securely via email or other out-of-band methods. Conduct thorough audits of user accounts for unauthorized access and enforce multi-factor authentication (MFA) to reduce the impact of compromised credentials. Finally, educate users about phishing and social engineering risks related to password resets.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-25T15:28:40.649Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0cf8b32ffcdb8a25ff5fe

Added to database: 2/26/2026, 10:56:11 PM

Last enriched: 2/26/2026, 11:10:46 PM

Last updated: 2/26/2026, 11:59:01 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses