CVE-2026-3186
Plain English Summary
AI-powered analysis for quick understanding
An attacker can remotely reset user passwords to a default value by manipulating a specific function in the application, potentially gaining unauthorized access to user accounts. This vulnerability affects versions up to 1.3.2-beta, and it has been publicly disclosed, so it's crucial to upgrade to version 1.3.3-beta to fix the issue.
Technical Description
A vulnerability was determined in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this vulnerability is an unknown functionality of the file /api/admin/sys-user/reset/password/ of the component Password Reset Handler. This manipulation of the argument userId causes use of default password. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.3.3-beta addresses this issue. Patch name: aefaabfd7527188bfba3c8c9eee17c316d094802. It is suggested to upgrade the affected component. The project was informed beforehand and acted very professional: "We have added authorization validation to the password reset interface; now only users with the corresponding permissions are allowed to perform password resets."
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 25, 2026
about 1 month ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
szadmin
Product
sz-boot-parent
Related Vulnerabilities
This vulnerability allows an attacker to upload any type of file to a specific API endpoint, which could lead to malicious files being executed on the server. The attack can be carried out remotely, and it affects versions up to 1.3.2-beta, so it's important to upgrade to the latest version to fix the issue.
An attacker can bypass authorization and access or manipulate messages that do not belong to them through a specific API endpoint. This vulnerability affects versions up to 1.3.2-beta and can be exploited remotely, so it's crucial to upgrade to version 1.3.3-beta to fix the issue.