An issue in Daylight Studio FuelCMS v1.5.2 allows attackers to exfiltrate users' password reset tokens via a mail splitting attack.
References
| Link | Resource |
|---|---|
| http://daylight.com | Not Applicable |
| http://fuelcms.com | Product |
| https://github.com/daylightstudio/FUEL-CMS | Product |
| https://pentest-tools.com/PTT-2025-025-Account-Takeover-via-Email-Array.pdf | Exploit Third Party Advisory |
Configurations
History
30 Mar 2026, 14:11
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.2:*:*:*:*:*:*:* | |
| References | () http://daylight.com - Not Applicable | |
| References | () http://fuelcms.com - Product | |
| References | () https://github.com/daylightstudio/FUEL-CMS - Product | |
| References | () https://pentest-tools.com/PTT-2025-025-Account-Takeover-via-Email-Array.pdf - Exploit, Third Party Advisory | |
| First Time |
Thedaylightstudio
Thedaylightstudio fuel Cms |
Information
Published : 2026-03-26 19:17
Updated : 2026-03-30 14:11
NVD link : CVE-2026-30458
Mitre link : CVE-2026-30458
CVE.ORG link : CVE-2026-30458
JSON object : View
Products Affected
thedaylightstudio
- fuel_cms
CWE
CWE-620
Unverified Password Change
