{ "schema_version": "1.4.0", "id": "GHSA-g8rg-59wq-2wg9", "modified": "2025-04-12T12:52:20Z", "published": "2022-05-17T03:25:55Z", "aliases": [ "CVE-2015-6928" ], "details": "classes/admin.class.php in CubeCart 5.2.12 through 5.2.16 and 6.x before 6.0.7 does not properly validate that a password reset request was made, which allows remote attackers to change the administrator password via a recovery request with a space character in the validate parameter and the administrator email in the email parameter.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6928" }, { "type": "WEB", "url": "https://forums.cubecart.com/topic/50277-critical-security-issue-admin-account-hijack" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/133535/CubeCart-6.0.6-Administrative-Bypass.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2015/Sep/40" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1034015" } ], "database_specific": { "cwe_ids": [ "CWE-284" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-09-28T15:59:00Z" } }