Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2895: Weak Password Recovery in funadmin

0
Medium
VulnerabilityCVE-2026-2895cvecve-2026-2895
Published: Sat Feb 21 2026 (02/21/2026, 23:02:11 UTC)
Source: CVE Database V5
Product: funadmin

Description

CVE-2026-2895 is a medium-severity vulnerability affecting funadmin versions up to 7. 1. 0-rc4. It involves a weakness in the password recovery function (repass) within the Member. php controller, where manipulation of the forget_code/vercode parameters can lead to weak password recovery. The vulnerability allows remote exploitation without authentication or user interaction, but the attack complexity is high, making exploitation difficult. The vendor has not responded to the disclosure, and no patches are currently available. Although the exploit code has been publicly released, no known widespread exploitation has been reported. Organizations using affected funadmin versions should prioritize mitigation to prevent unauthorized account access through this flaw.

AI-Powered Analysis

AILast updated: 02/21/2026, 23:31:25 UTC

Technical Analysis

CVE-2026-2895 identifies a security weakness in the funadmin web application framework, specifically in versions 7.1.0-rc1 through 7.1.0-rc4. The vulnerability resides in the repass function of the app/frontend/controller/Member.php file, which handles password recovery processes. An attacker can manipulate the forget_code or vercode parameters, which are presumably used to verify password reset requests, to bypass or weaken the password recovery mechanism. This manipulation enables unauthorized password resets remotely without requiring authentication or user interaction. The CVSS 4.0 score of 6.3 reflects a medium severity, with the attack vector being network-based and requiring high attack complexity, indicating that exploitation demands significant skill or conditions. The vulnerability does not impact confidentiality, availability, or integrity directly beyond the limited scope of password recovery integrity (VI:L). The vendor was notified early but has not issued a patch or response, and while exploit code is publicly available, no confirmed active exploitation has been observed. This vulnerability could allow attackers to gain unauthorized access to user accounts by resetting passwords, potentially leading to further compromise depending on the privileges of affected accounts.

Potential Impact

The primary impact of CVE-2026-2895 is unauthorized account access through compromised password recovery. Attackers exploiting this vulnerability can reset user passwords remotely, potentially gaining control over user accounts. This can lead to data exposure, privilege escalation, and unauthorized actions within the affected application. Organizations relying on funadmin for user management or critical business functions may face risks of account takeover, data breaches, and loss of user trust. The medium severity and high attack complexity reduce the likelihood of widespread exploitation, but targeted attacks against high-value accounts remain a concern. The absence of vendor response and patches increases risk exposure duration. If attackers gain administrative or privileged user access, the impact could escalate to full system compromise or lateral movement within the network.

Mitigation Recommendations

Since no official patch or vendor response is available, organizations should implement compensating controls immediately. These include disabling or restricting access to the password recovery functionality in funadmin until a fix is available. Implement multi-factor authentication (MFA) on user accounts to reduce the impact of compromised passwords. Monitor logs for unusual password reset attempts or suspicious activity related to the forget_code/vercode parameters. Employ web application firewalls (WAFs) with custom rules to detect and block abnormal manipulation of password recovery parameters. Conduct regular security assessments and penetration testing focusing on authentication and password recovery mechanisms. If possible, upgrade to a version of funadmin that addresses this issue once released or consider alternative secure user management solutions. Educate users about phishing and social engineering risks that could compound this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T18:56:43.277Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699a3cfabe58cf853b5c220a

Added to database: 2/21/2026, 11:17:14 PM

Last enriched: 2/21/2026, 11:31:25 PM

Last updated: 2/22/2026, 4:11:02 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats