CVE-2025-4552

A vulnerability has been found in ContiNew Admin up to 3.6.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dev-api/system/user/1/password. The manipulation leads to unverified password change. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

Configuration 1 (hide)

cpe:2.3:a:continew:continew_admin:*:*:*:*:*:*:*:*

History

10 Nov 2025, 15:00

Type Values Removed Values Added
References () https://github.com/uglory-gll/javasec/blob/main/continew-admin.md#21dev-apisystemuser1password-only-assigning-password-reset-permission-can-reset-the-super-administrator-password - () https://github.com/uglory-gll/javasec/blob/main/continew-admin.md#21dev-apisystemuser1password-only-assigning-password-reset-permission-can-reset-the-super-administrator-password - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.308299 - () https://vuldb.com/?ctiid.308299 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.308299 - () https://vuldb.com/?id.308299 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.567572 - () https://vuldb.com/?submit.567572 - Third Party Advisory, VDB Entry
First Time Continew continew Admin
Continew
CPE cpe:2.3:a:continew:continew_admin:*:*:*:*:*:*:*:*

Information

Published : 2025-05-12 00:15

Updated : 2025-11-10 15:00


NVD link : CVE-2025-4552

Mitre link : CVE-2025-4552

CVE.ORG link : CVE-2025-4552


JSON object : View

Products Affected

continew

  • continew_admin
CWE
CWE-620

Unverified Password Change

CWE-640

Weak Password Recovery Mechanism for Forgotten Password