CVE-2026-1670
Unknown · Multiple Products
An unauthenticated API endpoint exposure allows remote attackers to modify the "forgot password" recovery email address, facilitating account takeover.
Executive summary
The affected software contains a critical unauthenticated API vulnerability that allows attackers to hijack user accounts by changing password recovery email addresses.
Vulnerability
This vulnerability involves the exposure of a sensitive API endpoint that does not require authentication. An unauthenticated remote attacker can call this endpoint to change the recovery email associated with any user account.
Business impact
Successful exploitation leads to widespread account takeovers, potentially including administrative accounts. The CVSS score of 9.8 underscores the critical risk of unauthorized access to sensitive data and the total loss of user identity integrity.
Remediation
Immediate Action: Update the affected software to the latest version to secure the API endpoint and enforce proper authentication checks.
Proactive Monitoring: Audit account modification logs for unexpected changes to recovery email addresses and monitor API traffic for unauthorized requests to sensitive endpoints.
Compensating Controls: Deploy a Web Application Firewall (WAF) to block access to the vulnerable API endpoint until a permanent patch can be applied.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The ability for unauthenticated attackers to redirect password resets makes this a high-priority threat. Organizations must apply the vendor-provided security updates immediately to prevent large-scale account compromises.