<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Weak-Password — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/weak-password/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 18:30:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/weak-password/feed.xml" rel="self" type="application/rss+xml"/><item><title>ApostropheCMS Account Takeover via Weak Password Reset Mechanism (CVE-2026-45013)</title><link>https://feed.craftedsignal.io/briefs/2026-05-weak-password-reset/</link><pubDate>Thu, 14 May 2026 18:30:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-weak-password-reset/</guid><description>ApostropheCMS is vulnerable to account takeover due to a weak password recovery mechanism; the password reset flow constructs the reset URL using `req.hostname`, derived from the attacker-controlled HTTP `Host` header when `apos.baseUrl` is not explicitly configured, enabling account takeover if the victim clicks a malicious password reset link.</description><content:encoded><![CDATA[<p>ApostropheCMS is vulnerable to a critical account takeover flaw (CVE-2026-45013) stemming from a weak password reset implementation. The vulnerability resides in <code>modules/@apostrophecms/login/index.js</code> within the <code>resetRequest</code> route. The issue arises when <code>apos.baseUrl</code> is not explicitly configured, causing the application to construct the password reset URL using the <code>Host</code> header of the incoming HTTP request. This allows an unauthenticated attacker, knowing a victim&rsquo;s email address, to craft a password reset request that directs the victim to a malicious domain under the attacker&rsquo;s control. The victim unknowingly provides the valid reset token to the attacker when clicking the link, enabling full account takeover. This vulnerability affects ApostropheCMS versions up to and including 4.29.0. It matters for defenders because successful exploitation requires minimal attacker effort and can lead to significant data breaches or unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a valid user&rsquo;s email address, potentially through publicly accessible information on the target website.</li>
<li>The attacker crafts an HTTP POST request to the <code>/api/v1/login/reset-request</code> endpoint, setting the <code>Host</code> header to a domain they control (e.g., <code>evil.attacker.com</code>). The request body includes the victim&rsquo;s email address in JSON format.</li>
<li>The server, lacking a configured <code>apos.baseUrl</code>, uses the attacker-controlled <code>Host</code> header to generate a password reset link.</li>
<li>The application sends a password reset email to the victim, containing a URL that points to the attacker&rsquo;s domain. This URL includes a valid, server-generated reset token and the victim&rsquo;s email address as query parameters.</li>
<li>The victim, believing the email to be legitimate, clicks the malicious link.</li>
<li>The victim&rsquo;s browser sends a GET request to the attacker&rsquo;s server, including the valid reset token and email address in the query parameters.</li>
<li>The attacker&rsquo;s server captures the reset token and email address from the incoming request.</li>
<li>The attacker uses the captured token and email address to submit a password reset request to the legitimate <code>/api/v1/login/reset</code> endpoint, setting a new password for the victim&rsquo;s account, resulting in full account takeover.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-45013 allows an attacker to gain full control of any user account for which they know the email address. This can lead to unauthorized access to sensitive data, modification of website content, and potential further compromise of the entire ApostropheCMS instance. The vulnerability requires no authentication and minimal interaction from the victim, making it easily exploitable at scale. The impact is especially high for deployments where <code>apos.baseUrl</code> is not configured, which is common in development environments and some production setups.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately configure the <code>apos.baseUrl</code> option in your ApostropheCMS deployment to mitigate CVE-2026-45013, as described in the advisory&rsquo;s &ldquo;Remediation&rdquo; section. This will prevent the application from using the attacker-controlled <code>Host</code> header when generating password reset URLs.</li>
<li>Deploy the Sigma rule &ldquo;Detect ApostropheCMS Weak Password Reset Request&rdquo; to identify attempted exploitation by monitoring for password reset requests with a suspicious Host header.</li>
<li>Deploy the Sigma rule &ldquo;Detect Access to Password Reset URL&rdquo; to detect when a user clicks on a password reset link from an attacker-controlled host.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>weak-password</category><category>account-takeover</category></item></channel></rss>