CVE-2024-48176

Lylme Spage v1.9.5 is vulnerable to Incorrect Access Control. There is no limit on the number of login attempts, and the verification code will not be refreshed after a failed login, which allows attackers to blast the username and password and log into the system backend.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:lylme:lylme_spage:1.9.5:*:*:*:*:*:*:*

History

01 May 2025, 15:00

Type Values Removed Values Added
CPE cpe:2.3:a:lylme:lylme_spage:1.9.5:*:*:*:*:*:*:*
References () https://gist.github.com/Gryffinbit/c0b37c6caae4844d4f59368e454d3e46 - () https://gist.github.com/Gryffinbit/c0b37c6caae4844d4f59368e454d3e46 - Third Party Advisory
First Time Lylme
Lylme lylme Spage

06 Nov 2024, 16:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-863
Summary
  • (es) Lylme Spage v1.9.5 es vulnerable a un control de acceso incorrecto. No hay límite en la cantidad de intentos de inicio de sesión y el código de verificación no se actualizará después de un inicio de sesión fallido, lo que permite a los atacantes obtener el nombre de usuario y la contraseña e iniciar sesión en el backend del sistema.

05 Nov 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-05 23:15

Updated : 2025-05-01 15:00


NVD link : CVE-2024-48176

Mitre link : CVE-2024-48176

CVE.ORG link : CVE-2024-48176


JSON object : View

Products Affected

lylme

  • lylme_spage
CWE
CWE-863

Incorrect Authorization