CVE-2026-30459
HIGH
7,1
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: low
Integrity: high
Availability: none
Description
AI Translation Available
An issue in the Forgot Password feature of Daylight Studio FuelCMS v1.5.2 allows unauthenticated attackers to obtain the password reset token of a victim user via a crafted link placed in a valid e-mail message.
640
Weak Password Recovery Mechanism for Forgotten Password
IncompleteCommon Consequences
Security Scopes Affected:
Access Control
Availability
Integrity
Other
Potential Impacts:
Gain Privileges Or Assume Identity
Dos: Resource Consumption (Other)
Other
Applicable Platforms
All platforms may be affected
http://daylight.com
http://fuelcms.com
https://github.com/daylightstudio/FUEL-CMS/blob/master/fuel/modules/fuel/contro…
https://pentest-tools.com/PTT-2025-029-Password-Reset-Poisoning-via-Host-Header…