Data Center Audit 2.6.2 contains a cross-site request forgery vulnerability that allows attackers to reset administrator passwords without authentication by submitting crafted POST requests. Attackers can send requests to dca_resetpw.php with parameters updateuser, pass, pass2, and submit_reset to change the admin account password and gain administrative access.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sourceforge
Sourceforge data Center Audit |
|
| Vendors & Products |
Sourceforge
Sourceforge data Center Audit |
Fri, 06 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Data Center Audit 2.6.2 contains a cross-site request forgery vulnerability that allows attackers to reset administrator passwords without authentication by submitting crafted POST requests. Attackers can send requests to dca_resetpw.php with parameters updateuser, pass, pass2, and submit_reset to change the admin account password and gain administrative access. | |
| Title | Data Center Audit 2.6.2 Cross-Site Request Forgery via dca_resetpw.php | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-03-06T12:19:07.336Z
Updated: 2026-03-09T15:24:21.368Z
Reserved: 2026-03-06T11:47:51.827Z
Link: CVE-2018-25177
No data.
Status : Awaiting Analysis
Published: 2026-03-06T13:15:59.677
Modified: 2026-03-09T13:35:34.633
Link: CVE-2018-25177
No data.