macrozheng mall version 1.0.3 and prior contains an authentication vulnerability in the mall-portal password reset workflow that allows an unauthenticated attacker to reset arbitrary user account passwords using only a victim’s telephone number. The password reset flow exposes the one-time password (OTP) directly in the API response and validates password reset requests solely by comparing the provided OTP to a value stored by telephone number, without verifying user identity or ownership of the telephone number. This enables remote account takeover of any user with a known or guessable telephone number.
Metrics
Affected Vendors & Products
References
History
Sat, 07 Feb 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | macrozheng mall version 1.0.3 and prior contains an authentication vulnerability in the mall-portal password reset workflow that allows an unauthenticated attacker to reset arbitrary user account passwords using only a victim’s telephone number. The password reset flow exposes the one-time password (OTP) directly in the API response and validates password reset requests solely by comparing the provided OTP to a value stored by telephone number, without verifying user identity or ownership of the telephone number. This enables remote account takeover of any user with a known or guessable telephone number. | |
| Title | macrozheng mall <= 1.0.3 Unauthenticated Password Reset via OTP Disclosure | |
| Weaknesses | CWE-640 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-07T21:45:41.186Z
Reserved: 2026-02-06T19:12:03.463Z
Link: CVE-2026-25858
No data.
Status : Received
Published: 2026-02-07T22:16:02.753
Modified: 2026-02-07T22:16:02.753
Link: CVE-2026-25858
No data.
OpenCVE Enrichment
No data.