Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-3186

Summary
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
Published At-25 Feb, 2026 | 13:32
Updated At-25 Feb, 2026 | 14:28
Rejected At-
Credits

feiyuchuixue sz-boot-parent Password Reset password default password

A vulnerability was determined in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this vulnerability is an unknown functionality of the file /api/admin/sys-user/reset/password/ of the component Password Reset Handler. This manipulation of the argument userId causes use of default password. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.3.3-beta addresses this issue. Patch name: aefaabfd7527188bfba3c8c9eee17c316d094802. It is suggested to upgrade the affected component. The project was informed beforehand and acted very professional: "We have added authorization validation to the password reset interface; now only users with the corresponding permissions are allowed to perform password resets."

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:VulDB
Assigner Org ID:1af790b2-7ee1-4545-860a-a788eba489b5
Published At:25 Feb, 2026 | 13:32
Updated At:25 Feb, 2026 | 14:28
Rejected At:
▼CVE Numbering Authority (CNA)
feiyuchuixue sz-boot-parent Password Reset password default password

A vulnerability was determined in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this vulnerability is an unknown functionality of the file /api/admin/sys-user/reset/password/ of the component Password Reset Handler. This manipulation of the argument userId causes use of default password. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.3.3-beta addresses this issue. Patch name: aefaabfd7527188bfba3c8c9eee17c316d094802. It is suggested to upgrade the affected component. The project was informed beforehand and acted very professional: "We have added authorization validation to the password reset interface; now only users with the corresponding permissions are allowed to perform password resets."

Affected Products
Vendor
feiyuchuixue
Product
sz-boot-parent
Modules
  • Password Reset Handler
Versions
Affected
  • 1.3.2-beta
Unaffected
  • 1.3.3-beta
Problem Types
TypeCWE IDDescription
CWECWE-1393Use of Default Password
Type: CWE
CWE ID: CWE-1393
Description: Use of Default Password
Metrics
VersionBase scoreBase severityVector
4.05.3MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
3.16.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
3.06.3MEDIUM
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
2.06.5N/A
AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
Version: 4.0
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Version: 3.0
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Version: 2.0
Base score: 6.5
Base severity: N/A
Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
yuccun (VulDB User)
Timeline
EventDate
Advisory disclosed2026-02-25 00:00:00
VulDB entry created2026-02-25 01:00:00
VulDB entry last update2026-02-25 09:37:23
Event: Advisory disclosed
Date: 2026-02-25 00:00:00
Event: VulDB entry created
Date: 2026-02-25 01:00:00
Event: VulDB entry last update
Date: 2026-02-25 09:37:23
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.347744
vdb-entry
technical-description
https://vuldb.com/?ctiid.347744
signature
permissions-required
https://vuldb.com/?submit.754037
third-party-advisory
https://github.com/yuccun/CVE/blob/main/sz-boot-parent-VPE_Unauthorized_Password_Reset.md
exploit
https://github.com/feiyuchuixue/sz-boot-parent/commit/aefaabfd7527188bfba3c8c9eee17c316d094802
patch
https://github.com/feiyuchuixue/sz-boot-parent/releases/tag/v1.3.3-beta
patch
https://github.com/feiyuchuixue/sz-boot-parent/
product
Hyperlink: https://vuldb.com/?id.347744
Resource:
vdb-entry
technical-description
Hyperlink: https://vuldb.com/?ctiid.347744
Resource:
signature
permissions-required
Hyperlink: https://vuldb.com/?submit.754037
Resource:
third-party-advisory
Hyperlink: https://github.com/yuccun/CVE/blob/main/sz-boot-parent-VPE_Unauthorized_Password_Reset.md
Resource:
exploit
Hyperlink: https://github.com/feiyuchuixue/sz-boot-parent/commit/aefaabfd7527188bfba3c8c9eee17c316d094802
Resource:
patch
Hyperlink: https://github.com/feiyuchuixue/sz-boot-parent/releases/tag/v1.3.3-beta
Resource:
patch
Hyperlink: https://github.com/feiyuchuixue/sz-boot-parent/
Resource:
product
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cna@vuldb.com
Published At:25 Feb, 2026 | 14:16
Updated At:26 Feb, 2026 | 15:53

A vulnerability was determined in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this vulnerability is an unknown functionality of the file /api/admin/sys-user/reset/password/ of the component Password Reset Handler. This manipulation of the argument userId causes use of default password. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.3.3-beta addresses this issue. Patch name: aefaabfd7527188bfba3c8c9eee17c316d094802. It is suggested to upgrade the affected component. The project was informed beforehand and acted very professional: "We have added authorization validation to the password reset interface; now only users with the corresponding permissions are allowed to perform password resets."

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.05.3MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.16.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Primary3.14.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Secondary2.06.5MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
Type: Secondary
Version: 4.0
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Type: Primary
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Type: Secondary
Version: 2.0
Base score: 6.5
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P
CPE Matches

szadmin
szadmin
>>sz-boot-parent>>Versions up to 0.9.0(inclusive)
cpe:2.3:a:szadmin:sz-boot-parent:*:*:*:*:*:*:*:*
szadmin
szadmin
>>sz-boot-parent>>1.0.0
cpe:2.3:a:szadmin:sz-boot-parent:1.0.0:beta:*:*:*:*:*:*
szadmin
szadmin
>>sz-boot-parent>>1.0.1
cpe:2.3:a:szadmin:sz-boot-parent:1.0.1:beta:*:*:*:*:*:*
szadmin
szadmin
>>sz-boot-parent>>1.0.2
cpe:2.3:a:szadmin:sz-boot-parent:1.0.2:beta:*:*:*:*:*:*
szadmin
szadmin
>>sz-boot-parent>>1.1.0
cpe:2.3:a:szadmin:sz-boot-parent:1.1.0:beta:*:*:*:*:*:*
szadmin
szadmin
>>sz-boot-parent>>1.2.0
cpe:2.3:a:szadmin:sz-boot-parent:1.2.0:beta:*:*:*:*:*:*
szadmin
szadmin
>>sz-boot-parent>>1.2.1
cpe:2.3:a:szadmin:sz-boot-parent:1.2.1:beta:*:*:*:*:*:*
szadmin
szadmin
>>sz-boot-parent>>1.2.2
cpe:2.3:a:szadmin:sz-boot-parent:1.2.2:beta:*:*:*:*:*:*
szadmin
szadmin
>>sz-boot-parent>>1.2.3
cpe:2.3:a:szadmin:sz-boot-parent:1.2.3:beta:*:*:*:*:*:*
szadmin
szadmin
>>sz-boot-parent>>1.2.4
cpe:2.3:a:szadmin:sz-boot-parent:1.2.4:beta:*:*:*:*:*:*
szadmin
szadmin
>>sz-boot-parent>>1.2.5
cpe:2.3:a:szadmin:sz-boot-parent:1.2.5:beta:*:*:*:*:*:*
szadmin
szadmin
>>sz-boot-parent>>1.2.6
cpe:2.3:a:szadmin:sz-boot-parent:1.2.6:beta:*:*:*:*:*:*
szadmin
szadmin
>>sz-boot-parent>>1.3.0
cpe:2.3:a:szadmin:sz-boot-parent:1.3.0:beta:*:*:*:*:*:*
szadmin
szadmin
>>sz-boot-parent>>1.3.1
cpe:2.3:a:szadmin:sz-boot-parent:1.3.1:beta:*:*:*:*:*:*
szadmin
szadmin
>>sz-boot-parent>>1.3.2
cpe:2.3:a:szadmin:sz-boot-parent:1.3.2:beta:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-1393Primarycna@vuldb.com
CWE ID: CWE-1393
Type: Primary
Source: cna@vuldb.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/feiyuchuixue/sz-boot-parent/cna@vuldb.com
Product
https://github.com/feiyuchuixue/sz-boot-parent/commit/aefaabfd7527188bfba3c8c9eee17c316d094802cna@vuldb.com
Patch
https://github.com/feiyuchuixue/sz-boot-parent/releases/tag/v1.3.3-betacna@vuldb.com
Release Notes
https://github.com/yuccun/CVE/blob/main/sz-boot-parent-VPE_Unauthorized_Password_Reset.mdcna@vuldb.com
Exploit
Third Party Advisory
https://vuldb.com/?ctiid.347744cna@vuldb.com
Permissions Required
Third Party Advisory
VDB Entry
https://vuldb.com/?id.347744cna@vuldb.com
Third Party Advisory
VDB Entry
https://vuldb.com/?submit.754037cna@vuldb.com
Third Party Advisory
VDB Entry
Hyperlink: https://github.com/feiyuchuixue/sz-boot-parent/
Source: cna@vuldb.com
Resource:
Product
Hyperlink: https://github.com/feiyuchuixue/sz-boot-parent/commit/aefaabfd7527188bfba3c8c9eee17c316d094802
Source: cna@vuldb.com
Resource:
Patch
Hyperlink: https://github.com/feiyuchuixue/sz-boot-parent/releases/tag/v1.3.3-beta
Source: cna@vuldb.com
Resource:
Release Notes
Hyperlink: https://github.com/yuccun/CVE/blob/main/sz-boot-parent-VPE_Unauthorized_Password_Reset.md
Source: cna@vuldb.com
Resource:
Exploit
Third Party Advisory
Hyperlink: https://vuldb.com/?ctiid.347744
Source: cna@vuldb.com
Resource:
Permissions Required
Third Party Advisory
VDB Entry
Hyperlink: https://vuldb.com/?id.347744
Source: cna@vuldb.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://vuldb.com/?submit.754037
Source: cna@vuldb.com
Resource:
Third Party Advisory
VDB Entry

Change History

0
Information is not available yet

Similar CVEs

1Records found

CVE-2026-3187
Matching Score-8
Assigner-VulDB
ShareView Details
Matching Score-8
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 17.43%
||
7 Day CHG~0.00%
Published-25 Feb, 2026 | 14:32
Updated-26 Feb, 2026 | 15:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
feiyuchuixue sz-boot-parent API Endpoint upload unrestricted upload

A vulnerability was identified in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this issue is some unknown functionality of the file /api/admin/sys-file/upload of the component API Endpoint. Such manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit is publicly available and might be used. Upgrading to version 1.3.3-beta can resolve this issue. The name of the patch is aefaabfd7527188bfba3c8c9eee17c316d094802. Upgrading the affected component is recommended. The project was informed beforehand and acted very professional: "We have introduced a whitelist restriction on the /api/admin/sys-file/upload endpoint via the oss.allowedExts and oss.allowedMimeTypes configuration options, allowing the specification of permitted file extensions and MIME types for uploads."

Action-Not Available
Vendor-szadminfeiyuchuixue
Product-sz-boot-parentsz-boot-parent
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
Details not found