Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade ci4-cms-erp/ci4ms to version 0.28.5.0 or higher.
ci4-cms-erp/ci4ms is a composer create-project ci4-cms-erp/ci4ms
Affected versions of this package are vulnerable to Information Exposure via the password reset. An attacker can determine whether specific email addresses are registered in the system by analyzing the application's response to password reset requests. This information can be leveraged for targeted attacks such as phishing or brute-force attempts.
This vulnerability can be mitigated by implementing a uniform, generic response for all password reset requests, regardless of whether the email exists.