Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
WS-2022-0378
Published:May 15, 2026
Updated:May 15, 2026
Impact What kind of vulnerability is it? Who is impacted? This is an API vulnerability in Redwood's [dbAuth], specifically the dbAuth forgot password feature: - only projects with the dbAuth "forgot password" feature are affected - this vulnerability was introduced in v0.38.0 User Accounts are Vulnerable to Takeover (Hijacking) A reset token for any user can be obtained given knowledge of their username or email via the forgot-password API. With the leaked reset token, a malicious user could request to reset a user's password, changing their credentials and gaining access to their account. How to Determine if Projects have been Attacked To determine if a project has been attacked, we recommend checking logs for suspicious activity; namely, the volume of requests to the forgot-password API using emails that don't exist. Another indication is if users inform you that they can't access their accounts. If you have question or concerns, reach out via the "For More Information" section below. Patch Releases Available The problem has been patched on the v3 and v2 release lines. Users should upgrade to v3.3.1+ or v2.2.5+ respectively. Workarounds Is there a way for users to fix or remediate the vulnerability without upgrading? We recommend upgrading to the Patch Releases above. If upgrading is not possible, there are several workarounds: Manually strip out "resetToken" and "resetTokenExpiresAt" in the "forgotPassword.handler()" Users on all release lines can have their "forgotPassword.handler()" function strip out the sensitive fields manually before returning handler: (user) => { // your code to notify/email user of the link to reset their password... const = { resetToken, resetTokenExpiresAt, ...rest } return rest } Use "yarn patch" to manually apply the fix Users on v3 and v2 can use ["yarn patch"] to apply the fix if they're using yarn v3. See the dbAuth "forgot-password" Account Takeover Vulnerability high gist for instructions. Disable the forgot password flow entirely v3 only Users on v3 can disable the forgot password flow entirely.
Do you need more information?
Contact Us
CVSS v4
Base Score:
9.3
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
HIGH
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
9.1
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
NONE