CVE-2025-22144
Account Takeover in NamelessMC
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
NamelessMC is a free, easy to use & powerful website software for Minecraft servers. A user with admincp.core.emails or admincp.users.edit permissions can validate users and an attacker can reset their password. When the account is successfully approved by email the reset code is NULL, but when the account is manually validated by a user with admincp.core.emails or admincp.users.edit permissions then the reset_code will no longer be NULL but empty. An attacker can request http://localhost/nameless/index.php?route=/forgot_password/&c= and reset the password. As a result an attacker may compromise another users password and take over their account. This issue has been addressed in release version 2.1.3 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-12-30 CVE Reserved
- 2025-01-13 CVE Published
- 2025-01-13 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-610: Externally Controlled Reference to a Resource in Another Sphere
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/NamelessMC/Nameless/releases/tag/v2.1.3 | X_refsource_misc | |
https://github.com/NamelessMC/Nameless/security/advisories/GHSA-p883-7496-x35p | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
NamelessMC Search vendor "NamelessMC" | Nameless Search vendor "NamelessMC" for product "Nameless" | <= 2.1.2 Search vendor "NamelessMC" for product "Nameless" and version " <= 2.1.2" | en |
Affected
|