A security flaw has been discovered in funadmin up to 7.1.0-rc4. Affected by this issue is the function repass of the file app/frontend/controller/Member.php. Performing a manipulation of the argument forget_code/vercode results in weak password recovery. Remote exploitation of the attack is possible. The attack's complexity is rated as high. The exploitation is known to be difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Metrics
Affected Vendors & Products
References
History
Sat, 21 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in funadmin up to 7.1.0-rc4. Affected by this issue is the function repass of the file app/frontend/controller/Member.php. Performing a manipulation of the argument forget_code/vercode results in weak password recovery. Remote exploitation of the attack is possible. The attack's complexity is rated as high. The exploitation is known to be difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | funadmin Member.php repass password recovery | |
| First Time appeared |
Funadmin
Funadmin funadmin |
|
| Weaknesses | CWE-640 | |
| CPEs | cpe:2.3:a:funadmin:funadmin:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Funadmin
Funadmin funadmin |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-02-21T23:02:11.258Z
Updated: 2026-02-21T23:02:11.258Z
Reserved: 2026-02-20T18:56:43.277Z
Link: CVE-2026-2895
No data.
Status : Received
Published: 2026-02-21T23:15:59.990
Modified: 2026-02-21T23:15:59.990
Link: CVE-2026-2895
No data.
ReportizFlow