CVE-2025-22144

NamelessMC is a free, easy to use & powerful website software for Minecraft servers. A user with admincp.core.emails or admincp.users.edit permissions can validate users and an attacker can reset their password. When the account is successfully approved by email the reset code is NULL, but when the account is manually validated by a user with admincp.core.emails or admincp.users.edit permissions then the reset_code will no longer be NULL but empty. An attacker can request http://localhost/nameless/index.php?route=/forgot_password/&c= and reset the password. As a result an attacker may compromise another users password and take over their account. This issue has been addressed in release version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:namelessmc:nameless:*:*:*:*:*:*:*:*

History

13 May 2025, 15:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:namelessmc:nameless:*:*:*:*:*:*:*:*
References () https://github.com/NamelessMC/Nameless/releases/tag/v2.1.3 - () https://github.com/NamelessMC/Nameless/releases/tag/v2.1.3 - Release Notes
References () https://github.com/NamelessMC/Nameless/security/advisories/GHSA-p883-7496-x35p - () https://github.com/NamelessMC/Nameless/security/advisories/GHSA-p883-7496-x35p - Exploit, Vendor Advisory
CWE CWE-640
First Time Namelessmc nameless
Namelessmc
Summary
  • (es) NamelessMC es un software gratuito, fácil de usar y potente para servidores de Minecraft. Un usuario con permisos admincp.core.emails o admincp.users.edit puede validar usuarios y un atacante puede restablecer sus contraseñas. Cuando la cuenta se aprueba correctamente por correo electrónico, el código de restablecimiento es NULL, pero cuando la cuenta es validada manualmente por un usuario con permisos admincp.core.emails o admincp.users.edit, el código de restablecimiento ya no será NULL, sino que estará vacío. Un atacante puede solicitar http://localhost/nameless/index.php?route=/forgot_password/&c= y restablecer la contraseña. Como resultado, un atacante puede comprometer la contraseña de otro usuario y tomar el control de su cuenta. Este problema se ha solucionado en la versión de lanzamiento 2.1.3 y se recomienda a todos los usuarios que la actualicen. No se conocen Workarounds para esta vulnerabilidad.

13 Jan 2025, 21:15

Type Values Removed Values Added
References () https://github.com/NamelessMC/Nameless/security/advisories/GHSA-p883-7496-x35p - () https://github.com/NamelessMC/Nameless/security/advisories/GHSA-p883-7496-x35p -

13 Jan 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-13 20:15

Updated : 2025-05-13 15:42


NVD link : CVE-2025-22144

Mitre link : CVE-2025-22144

CVE.ORG link : CVE-2025-22144


JSON object : View

Products Affected

namelessmc

  • nameless
CWE
CWE-610

Externally Controlled Reference to a Resource in Another Sphere

CWE-640

Weak Password Recovery Mechanism for Forgotten Password