Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2894: Information Disclosure in funadmin

0
Medium
VulnerabilityCVE-2026-2894cvecve-2026-2894
Published: Sat Feb 21 2026 (02/21/2026, 23:02:09 UTC)
Source: CVE Database V5
Product: funadmin

Description

A vulnerability was identified in funadmin up to 7.1.0-rc4. Affected by this vulnerability is the function getMember of the file app/frontend/view/login/forget.html. Such manipulation leads to information disclosure. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 06:16:20 UTC

Technical Analysis

CVE-2026-2894 is a medium severity information disclosure vulnerability affecting funadmin versions 7.1.0-rc1 through 7.1.0-rc4. The flaw resides in the getMember function located in the app/frontend/view/login/forget.html file. This function can be manipulated remotely by an unauthenticated attacker to disclose sensitive information, likely related to user membership or account details. The vulnerability does not require any privileges or user interaction, making it easier to exploit. The attack vector is network-based, allowing remote exploitation. The vendor was contacted early but has not issued any patch or advisory, and the exploit code is publicly available, increasing the risk of exploitation by malicious actors. The CVSS 4.0 vector (AV:N/AC:L/AT:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) indicates low complexity and no authentication required, with partial impact on confidentiality. No known active exploitation has been reported, but the presence of public exploit code elevates the threat. The vulnerability could lead to unauthorized disclosure of user data, which may facilitate further attacks such as social engineering or account takeover attempts.

Potential Impact

The primary impact of CVE-2026-2894 is unauthorized disclosure of sensitive information from funadmin installations running affected versions. This can compromise user privacy and confidentiality of membership or login-related data. Organizations relying on funadmin for user management or authentication may face data leakage risks, potentially damaging their reputation and violating data protection regulations. Although the vulnerability does not directly allow code execution or system takeover, the exposed information could be leveraged by attackers for targeted phishing, credential stuffing, or other follow-up attacks. The lack of vendor response and public exploit availability increases the likelihood of exploitation attempts. The medium severity rating reflects the moderate but significant risk posed by this vulnerability, especially in environments with sensitive user data or high-value targets.

Mitigation Recommendations

To mitigate CVE-2026-2894, organizations should immediately assess their use of funadmin and identify if affected versions (7.1.0-rc1 through 7.1.0-rc4) are deployed. Since no official patch is available, consider the following specific actions: 1) Restrict external access to the vulnerable getMember function or the forget.html page via network-level controls such as firewalls or web application firewalls (WAFs). 2) Implement strict input validation and output encoding on the affected endpoint if possible, to reduce information leakage. 3) Monitor logs for unusual access patterns targeting the forget.html page or getMember function. 4) Consider temporarily disabling or restricting the password reset or membership retrieval features until a patch or vendor guidance is available. 5) Engage with the funadmin community or maintainers for updates or unofficial patches. 6) Educate users and administrators about the risk and encourage vigilance against phishing or social engineering attacks that might leverage leaked information. 7) Plan for an upgrade or migration to a patched or alternative solution once available. These targeted mitigations go beyond generic advice by focusing on access controls, monitoring, and feature restrictions specific to the vulnerability context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T18:56:39.810Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699a3cfabe58cf853b5c2203

Added to database: 2/21/2026, 11:17:14 PM

Last enriched: 3/1/2026, 6:16:20 AM

Last updated: 4/8/2026, 10:51:01 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses