CVE-2025-55795

The openml/openml.org web application version v2.0.20241110 uses incremental user IDs and insufficient email ownership verification during email update workflows. An authenticated attacker controlling a user account with a lower user ID can update their email address to that of another user with a higher user ID without proper verification. This results in the victim's email being reassigned to the attacker's account, causing the victim to be locked out immediately and unable to log in. The vulnerability leads to denial of service via account lockout but does not grant the attacker direct access to the victim's private data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openml:openml.org:*:*:*:*:*:*:*:*

History

16 Oct 2025, 17:09

Type Values Removed Values Added
References () https://github.com/openml - () https://github.com/openml - Product
References () https://github.com/openml/openml.org - () https://github.com/openml/openml.org - Product
References () https://github.com/openml/openml.org/security/advisories/GHSA-87c5-mc8v-xf7r - () https://github.com/openml/openml.org/security/advisories/GHSA-87c5-mc8v-xf7r - Vendor Advisory, Exploit
First Time Openml openml.org
Openml
CPE cpe:2.3:a:openml:openml.org:*:*:*:*:*:*:*:*

29 Sep 2025, 18:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.5
CWE CWE-284
CWE-639

29 Sep 2025, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-29 15:16

Updated : 2025-10-16 17:09


NVD link : CVE-2025-55795

Mitre link : CVE-2025-55795

CVE.ORG link : CVE-2025-55795


JSON object : View

Products Affected

openml

  • openml.org
CWE
CWE-284

Improper Access Control

CWE-639

Authorization Bypass Through User-Controlled Key