CVE-2024-41890: Apache Answer: The link to reset the user's password will remain valid after sending a new link
4.8
CVSS Score
3.1
4.8
CVSS Score
3.1
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing resource invalidation logic for password reset tokens. The commit diff shows:
SetCode was modified to track userID->latest_code relationships
VerifyCode was updated to check against the latest code
Added cache keys (UserLatestEmailCodeCacheKey) to enforce single active token
This indicates the original functions lacked user-specific code tracking, allowing multiple valid tokens. The CWE-772 classification confirms this is a resource lifetime management issue.