Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2015-10071
Published:January 19, 2023
Updated:May 17, 2026
A vulnerability was found in gitter-badger ezpublish-modern-legacy. It has been rated as problematic. This issue affects some unknown processing of the file kernel/user/forgotpassword.php. The manipulation leads to weak password recovery. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 1.0 is able to address this issue. The patch is named 5908d5ee65fec61ce0e321d586530461a210bf2a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218951.
Affected Packages
mugoweb/ezpublish-legacy (PHP):
Affected version(s) >=v2015.01.0 <v2015.01.3
Fix Suggestion:
Update to version v2015.01.3
ezsystems/ezpublish-legacy (PHP):
Affected version(s) >=2012.9 <2017.12.x-dev
Fix Suggestion:
Update to version 2017.12.x-dev
mugoweb/ezpublish-legacy (PHP):
Affected version(s) >=dev-fix_EZP-21913_globalUsageScripts <dev-Issue/EZP-25301
Fix Suggestion:
Update to version dev-Issue/EZP-25301
mugoweb/ezpublish-legacy (PHP):
Affected version(s) >=v2014.01.0 <v2014.11.2
Fix Suggestion:
Update to version v2014.11.2
se7enxweb/ezpublish (PHP):
Affected version(s) =2013.04.0 <2023.12.x-dev
Fix Suggestion:
Update to version 2023.12.x-dev
datafactory/ezpublish-legacy (PHP):
Affected version(s) >=v2014.01.0 <v2017.07.1
Fix Suggestion:
Update to version v2017.07.1
mugoweb/ezpublish-legacy (PHP):
Affected version(s) =dev-batch-move-optimization <dev-better_urlencode
Fix Suggestion:
Update to version dev-better_urlencode
se7enxweb/ezpublish (PHP):
Affected version(s) >=v2015.01.0 <v2015.01.3
Fix Suggestion:
Update to version v2015.01.3
crevillo/ez-price-bundle (PHP):
Affected version(s) =dev-ez5 <dev-dev-ezp7
Fix Suggestion:
Update to version dev-dev-ezp7
mugoweb/ezpublish-legacy (PHP):
Affected version(s) >=2012.9 <2.9-3@426
Fix Suggestion:
Update to version 2.9-3@426
ezsystems/ezpublish-legacy (PHP):
Affected version(s) >=v2014.01.0 <v2014.11.2
Fix Suggestion:
Update to version v2014.11.2
datafactory/ezpublish-legacy (PHP):
Affected version(s) >=2012.9 <2.9-3@426
Fix Suggestion:
Update to version 2.9-3@426
netgen/ezpublish-legacy (PHP):
Affected version(s) >=v2015.01.0 <v2015.01.3
Fix Suggestion:
Update to version v2015.01.3
ezsystems/ezpublish-legacy (PHP):
Affected version(s) =dev-fix_EZP-21913_globalUsageScripts
Fix Suggestion:
Update to version no_fix
netgen/ezpublish-legacy (PHP):
Affected version(s) >=v2014.01.0 <v2014.11.2
Fix Suggestion:
Update to version v2014.11.2
ezsystems/ezpublish-legacy (PHP):
Affected version(s) >=v2015.01.0 <v2015.01.3
Fix Suggestion:
Update to version v2015.01.3
mugoweb/ezpublish-legacy (PHP):
Affected version(s) =dev-configurable_dfs_backend <dev-custom_object_names
Fix Suggestion:
Update to version dev-custom_object_names
se7enxweb/ezpublish (PHP):
Affected version(s) >=v2013.05.0 <v2014.11.2
Fix Suggestion:
Update to version v2014.11.2
netgen/ezpublish-legacy (PHP):
Affected version(s) >=v2013.04.0 <v2013.11
Fix Suggestion:
Update to version v2013.11
mugoweb/ezpublish-legacy (PHP):
Affected version(s) =dev-EZP-108.clean <dev-202308_808-migrate_the_code_to_display_the_trashed_date_in_the_admin_interface
Fix Suggestion:
Update to version dev-202308_808-migrate_the_code_to_display_the_trashed_date_in_the_admin_interface
mugoweb/ezpublish-legacy (PHP):
Affected version(s) >=v2013.04.0 <v2013.11
Fix Suggestion:
Update to version v2013.11
netgen/ezpublish-legacy (PHP):
Affected version(s) >=2012.9 <2023.12.01
Fix Suggestion:
Update to version 2023.12.01
Do you need more information?
Contact Us
CVSS v4
Base Score:
2.1
Attack Vector
ADJACENT
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
LOW
User Interaction
NONE
Vulnerable System Confidentiality
LOW
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
2.6
Attack Vector
ADJACENT
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
NONE
Weakness Type (CWE)
Weak Password Recovery Mechanism for Forgotten Password
EPSS
Base Score:
0.25