macrozheng mall version 1.0.3 and prior contains an authentication vulnerability in the mall-portal password reset workflow that allows an unauthenticated attacker to reset arbitrary user account passwords using only a victim’s telephone number. The password reset flow exposes the one-time password (OTP) directly in the API response and validates password reset requests solely by comparing the provided OTP to a value stored by telephone number, without verifying user identity or ownership of the telephone number. This enables remote account takeover of any user with a known or guessable telephone number.
References
| Link | Resource |
|---|---|
| https://github.com/macrozheng/mall/issues/946 | Not Applicable |
| https://www.macrozheng.com/ | Permissions Required |
| https://www.vulncheck.com/advisories/macrozheng-mall-unauthenticated-password-reset-via-otp-disclosure | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-02-07 22:16
Updated : 2026-03-05 20:31
NVD link : CVE-2026-25858
Mitre link : CVE-2026-25858
CVE.ORG link : CVE-2026-25858
JSON object : View
Products Affected
macrozheng
- mall
CWE
CWE-640
Weak Password Recovery Mechanism for Forgotten Password
