CVE-2023-50172: WWBN AVideo recovery notification bypass vulnerability
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.40551%
CWE
Published
1/10/2024
Updated
1/12/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| wwbn/avideo | composer | <= 12.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability arises because the userRecoverPass.php script calls setRecoverPass() to generate and save a recovery code (via $user->save()) before validating the captcha. This sequence allows the recovery code to persist in the database regardless of whether the captcha is valid. The Talos report explicitly identifies this flawed logic flow, where the recovery code is created first, making the system vulnerable to silent recovery code generation. The setRecoverPass function is directly responsible for generating the code, and its invocation prior to validation is the root cause.