Skip to content

A vulnerability was determined in feiyuchuixue sz-boot...

Moderate severity Unreviewed Published Feb 25, 2026 to the GitHub Advisory Database • Updated Feb 25, 2026

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

A vulnerability was determined in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected by this vulnerability is an unknown functionality of the file /api/admin/sys-user/reset/password/ of the component Password Reset Handler. This manipulation of the argument userId causes use of default password. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 1.3.3-beta addresses this issue. Patch name: aefaabfd7527188bfba3c8c9eee17c316d094802. It is suggested to upgrade the affected component. The project was informed beforehand and acted very professional: "We have added authorization validation to the password reset interface; now only users with the corresponding permissions are allowed to perform password resets."

References

Published by the National Vulnerability Database Feb 25, 2026
Published to the GitHub Advisory Database Feb 25, 2026
Last updated Feb 25, 2026

Severity

Moderate

EPSS score

Weaknesses

Use of Default Password

The product uses default passwords for potentially critical functionality. Learn more on MITRE.

CVE ID

CVE-2026-3186

GHSA ID

GHSA-px6f-q5hr-gqcp

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.