{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T04:19:14.391","vulnerabilities":[{"cve":{"id":"CVE-2020-7378","sourceIdentifier":"cve@rapid7.com","published":"2020-11-24T17:15:11.270","lastModified":"2024-11-21T05:37:08.140","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"CRIXP OpenCRX version 4.30 and 5.0-20200717 and prior suffers from an unverified password change vulnerability. An attacker who is able to connect to the affected OpenCRX instance can change the password of any user, including admin-Standard, to any chosen value. This issue was resolved in version 5.0-20200904, released September 4, 2020."},{"lang":"es","value":"CRIXP OpenCRX versiones 4.30 y 5.0-20200717 y anteriores sufre de una vulnerabilidad de cambio de contraseña no verificada.&#xa0;Un atacante que es capaz de conectarse a la instancia de OpenCRX afectada puede cambiar la contraseña de cualquier usuario, incluyendo admin-Standard, para cualquier valor elegido.&#xa0;Este problema se resolvió en la versión 5.0-20200904, publicada el 4 de septiembre de 2020"}],"metrics":{"cvssMetricV31":[{"source":"cve@rapid7.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cve@rapid7.com","type":"Secondary","description":[{"lang":"en","value":"CWE-620"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:opencrx:opencrx:*:*:*:*:*:*:*:*","versionEndIncluding":"4.3.0","matchCriteriaId":"8282601F-778E-4BCE-A249-9AF5632CB571"},{"vulnerable":true,"criteria":"cpe:2.3:a:opencrx:opencrx:5.0:20200714:*:*:*:*:*:*","matchCriteriaId":"A0F57F4C-1DDA-4975-83BF-FCE95EF8391F"},{"vulnerable":true,"criteria":"cpe:2.3:a:opencrx:opencrx:5.0:20200715:*:*:*:*:*:*","matchCriteriaId":"A1404512-2851-4B11-82A4-6F6027E71E4D"},{"vulnerable":true,"criteria":"cpe:2.3:a:opencrx:opencrx:5.0:20200717:*:*:*:*:*:*","matchCriteriaId":"372C678B-244F-498E-8E1B-FA49BC94B521"},{"vulnerable":true,"criteria":"cpe:2.3:a:opencrx:opencrx:5.0.0:*:*:*:*:*:*:*","matchCriteriaId":"B0DFA3FE-F0A3-4674-9E2D-8049CBDE3CB4"}]}]}],"references":[{"url":"https://blog.rapid7.com/2020/11/24/cve-2020-7378-opencrx-unverified-password-change/","source":"cve@rapid7.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://blog.rapid7.com/2020/11/24/cve-2020-7378-opencrx-unverified-password-change/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}