CVE-2025-13565
Published: 23 November 2025
Description
A weakness has been identified in SourceCodester Inventory Management System 1.0. The affected element is an unknown function of the file /model/user/resetPassword.php. Executing manipulation can lead to weak password recovery. The attack may be performed from remote. The exploit has…
more
been made available to the public and could be exploited.
Mitigating Controls (NIST 800-53 r5)AI
IA-5 mandates secure management of authenticators, including robust password recovery mechanisms to prevent weaknesses like CWE-640 in resetPassword.php.
SI-2 requires timely identification, reporting, and correction of system flaws such as the weak password recovery vulnerability in this CVE.
AC-14 limits permitted actions without identification or authentication, preventing unauthenticated remote manipulation of the password reset function.
Security SummaryAI
CVE-2025-13565 is a vulnerability in SourceCodester Inventory Management System 1.0, affecting an unknown function in the file /model/user/resetPassword.php. Published on 2025-11-23, it involves a weakness classified under CWE-640 that enables weak password recovery mechanisms through remote manipulation.
The vulnerability has a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N), meaning unauthenticated attackers can exploit it over the network with low complexity and no user interaction required. Exploitation allows remote manipulation leading to weak password recovery, with an impact limited to integrity.
Advisories from VulDB (ctiid.333329, id.333329, submit.697984) and a Notion page detail the unauthenticated password reset issue, while the vendor site is sourcecodester.com. No specific patch or mitigation details are provided in the references.
The exploit has been made publicly available and could be exploited.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated password reset vulnerability in public-facing web application enables exploitation of public-facing application (T1190), unsecured credentials via weak recovery (T1552 as noted in advisory), and subsequent use of valid accounts (T1078) through account takeover.