Description
In LabCup before <v2_next_18022, it is possible to use the save API to perform unauthorized actions for users without access to user management in order to, after successful exploitation, gain access to a victim's account. A user without the user-management privilege can change another user's email address if the attacker knows details of the victim such as the exact roles and group roles, ID, and remote authentication ID settings. These must be sent in a modified save API request. It was fixed in 6.3.0.03.
References (2)
Core 2
Core References
Third Party Advisory x_refsource_misc
https://github.com/Accenture/AARO-Bugs/blob/master/AARO-CVE-List.md
Vendor Advisory x_refsource_misc
https://labcup.net/privacy-data-security/
Scores
CVSS v3
3.1
EPSS
0.0019
EPSS Percentile
40.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
Details
CWE
CWE-862
Status
published
Products (1)
labcup/labcup
< v2_next_18022
Published
Jun 10, 2021
Tracked Since
Feb 18, 2026