Cyber Posture

CVE-2025-13565

MediumPublic PoC

Published: 23 November 2025

Published
23 November 2025
Modified
26 November 2025
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
EPSS Score 0.0013 32.5th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-13565 is a medium-severity Weak Password Recovery Mechanism for Forgotten Password (CWE-640) vulnerability in Warren-Daloyan Inventory Management System. Its CVSS base score is 5.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Valid Accounts (T1078); ranked at the 32.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Valid Accounts (T1078) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

IA-5 mandates secure management of authenticators, including robust password recovery mechanisms to prevent weaknesses like CWE-640 in resetPassword.php.

prevent

SI-2 requires timely identification, reporting, and correction of system flaws such as the weak password recovery vulnerability in this CVE.

prevent

AC-14 limits permitted actions without identification or authentication, preventing unauthenticated remote manipulation of the password reset function.

MITRE ATT&CK Enterprise TechniquesAI

T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

Unauthenticated password reset vulnerability in public-facing web application enables exploitation of public-facing application (T1190), unsecured credentials via weak recovery (T1552 as noted in advisory), and subsequent use of valid accounts (T1078) through account takeover.

NVD Description

A weakness has been identified in SourceCodester Inventory Management System 1.0. The affected element is an unknown function of the file /model/user/resetPassword.php. Executing manipulation can lead to weak password recovery. The attack may be performed from remote. The exploit has…

more

been made available to the public and could be exploited.

Deeper analysisAI

CVE-2025-13565 is a vulnerability in SourceCodester Inventory Management System 1.0, affecting an unknown function in the file /model/user/resetPassword.php. Published on 2025-11-23, it involves a weakness classified under CWE-640 that enables weak password recovery mechanisms through remote manipulation.

The vulnerability has a CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N), meaning unauthenticated attackers can exploit it over the network with low complexity and no user interaction required. Exploitation allows remote manipulation leading to weak password recovery, with an impact limited to integrity.

Advisories from VulDB (ctiid.333329, id.333329, submit.697984) and a Notion page detail the unauthenticated password reset issue, while the vendor site is sourcecodester.com. No specific patch or mitigation details are provided in the references.

The exploit has been made publicly available and could be exploited.

Details

CWE(s)

Affected Products

warren-daloyan
inventory management system
1.0

CVEs Like This One

CVE-2026-2564Shared CWE-640
CVE-2026-33707Shared CWE-640
CVE-2026-30459Shared CWE-640
CVE-2024-11350Shared CWE-640
CVE-2026-27593Shared CWE-640
CVE-2026-25858Shared CWE-640
CVE-2025-63314Shared CWE-640
CVE-2026-42606Shared CWE-640
CVE-2020-37172Shared CWE-640
CVE-2026-29199Shared CWE-640

References