Cyber Posture

CVE-2026-24467

CriticalPublic PoC

Published: 20 April 2026

Published
20 April 2026
Modified
25 April 2026
KEV Added
Patch
CVSS Score 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0089 75.8th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24467 is a critical-severity Weak Password Recovery Mechanism for Forgotten Password (CWE-640) vulnerability in Filigran Openaev. Its CVSS base score is 9.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 24.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

IA-5 requires managing authenticators with expiration, sufficient strength, and revocation procedures, directly preventing non-expiring short password reset tokens from enabling account takeover.

prevent

SI-2 mandates identification, reporting, and timely correction of system flaws, directly mitigating this CVE by requiring upgrades to patched versions like OpenAEV 2.0.13.

prevent

AC-7 limits consecutive invalid authentication attempts with lockout or delays, reducing the feasibility of brute-forcing accumulated valid password reset tokens.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1110 Brute Force Credential Access
Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained.
Why these techniques?

The vulnerability in the public-facing password reset mechanism of OpenAEV enables unauthenticated remote exploitation (T1190) through brute-forcing short, non-expiring tokens to achieve account takeover.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

OpenAEV is an open source platform allowing organizations to plan, schedule and conduct cyber adversary simulation campaign and tests. Starting in version 1.0.0 and prior to version 2.0.13, OpenAEV's password reset implementation contains multiple security weaknesses that together allow reliable…

more

account takeover. The primary issue is that password reset tokens do not expire. Once a token is generated, it remains valid indefinitely, even if significant time has passed or if newer tokens are issued for the same account. This allows an attacker to accumulate valid password reset tokens over time and reuse them at any point in the future to reset a victim’s password. A secondary weakness is that password reset tokens are only 8 digits long. While an 8-digit numeric token provides 100,000,000 possible combinations (which is secure enough), the ability to generate large numbers of valid tokens drastically reduces the required number of attempts to guess a valid password reset token. For example, if an attacker generates 2,000 valid tokens, the brute-force effort is reduced to approximately 50,000 attempts, which is a trivially achievable number of requests for an automated attack. (100 requests per second can mathematically find a valid password reset token in 500 seconds.) By combining these flaws, an attacker can mass-generate valid password reset tokens and then brute-force them efficiently until a match is found, allowing the attacker to reset the victim’s password to a value of their choosing. The original password is not required, and the attack can be performed entirely without authentication. This vulnerability enables full account takeover that leads to platform compromise. An unauthenticated remote attacker can reset the password of any registered user account and gain complete access without authentication. Because user email addresses are exposed to other users by design, a single guessed or observed email address is sufficient to compromise even administrator accounts with non-guessable email addresses. This design flaw results in a reliable and scalable account takeover vulnerability that affects any registered user account in the system. Note: The vulnerability does not require OpenAEV to have the email service configured. The exploit does not depend on the target email address to be a real email address. It just needs to be registered to OpenAEV. Successful exploitation allows an unauthenticated remote attacker to access sensitive data (such as the Findings section of a simulation), modify payloads executed by deployed agents to compromise all hosts where agents are installed (therefore the Scope is changed). Users should upgrade to version 2.0.13 to receive a fix.

Deeper analysisAI

CVE-2026-24467 is a critical vulnerability in the password reset implementation of OpenAEV, an open source platform for planning, scheduling, and conducting cyber adversary simulation campaigns and tests. It affects versions 1.0.0 through 2.0.12. The core issues include password reset tokens that do not expire, remaining valid indefinitely even after time passes or newer tokens are issued, and tokens that are only 8 digits long. These flaws enable attackers to accumulate valid tokens over time and brute-force them efficiently, as generating thousands of tokens reduces the search space to a trivial number of attempts achievable via automation.

An unauthenticated remote attacker can exploit this vulnerability against any registered user account, including administrators, without requiring the original password or a configured email service—the attack only needs a registered email address, which are exposed to other users by design. By mass-generating valid tokens and brute-forcing until a match is found, the attacker resets the victim's password to one of their choosing, achieving full account takeover. This grants complete platform access, including sensitive data in simulation findings sections, and allows modification of payloads executed by deployed agents, enabling compromise of all hosts where those agents are installed and altering the simulation scope.

The official mitigation, as detailed in the GitHub security advisory (GHSA-vcjx-vw28-25p2) and release notes for version 2.0.13, is to upgrade to OpenAEV 2.0.13, which addresses the token expiration and generation weaknesses. The fixing commit (c09a4e71ea76d26fc28c9b51c76bca89a902df4f) and vulnerable code in UserApi.java are publicly available for review. The vulnerability is rated CVSS 9.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H) and mapped to CWE-640 (Weak Password Recovery Mechanism for Forgotten Password).

Details

CWE(s)

Affected Products

filigran
openaev
1.0.0 — 2.0.13

CVEs Like This One

CVE-2025-12866Shared CWE-640
CVE-2026-25858Shared CWE-640
CVE-2025-63314Shared CWE-640
CVE-2026-42606Shared CWE-640
CVE-2025-1570Shared CWE-640
CVE-2020-37172Shared CWE-640
CVE-2026-29199Shared CWE-640
CVE-2026-40585Shared CWE-640
CVE-2022-50910Shared CWE-640
CVE-2026-1325Shared CWE-640

References