CVE-2026-3186 - Vulnerability Analysis
MediumCVSS: 6.3Last Updated: February 26, 2026
feiyuchuixue sz-boot-parent - Broken Access Control
Published: February 25, 2026Updated: February 26, 2026PoC AvailableRemote Exploitable
Overview
feiyuchuixue sz-boot-parent <= 1.3.2-beta contains a broken access control caused by lack of authorization validation in password reset handler, letting remote attackers reset passwords using default credentials, exploit requires attacker to have appropriate permissions.
Severity & Score
Severity: Medium
CVSS Score: 6.3
Impact
Attackers can reset user passwords remotely, potentially leading to account takeover and privilege escalation.
Mitigation
Upgrade to version 1.3.3-beta.
References
- https://github.com/yuccun/CVE/blob/main/sz-boot-parent-VPE_Unauthorized_Password_Reset.md
- https://vuldb.com/?ctiid.347744
- https://vuldb.com/?id.347744
- https://vuldb.com/?submit.754037
- https://github.com/feiyuchuixue/sz-boot-parent/
- https://github.com/feiyuchuixue/sz-boot-parent/commit/aefaabfd7527188bfba3c8c9eee17c316d094802
- https://github.com/feiyuchuixue/sz-boot-parent/releases/tag/v1.3.3-beta
Related Resources
Details
- CVE ID
- CVE-2026-3186
- Severity
- Medium
- CVSS Score
- 6.3
- Type
- broken_access_control
- Status
- confirmed
CWE
- CWE-1393
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L