CVE-2026-30459
Published: 16 April 2026
Summary
CVE-2026-30459 is a high-severity Weak Password Recovery Mechanism for Forgotten Password (CWE-640) vulnerability in Thedaylightstudio Fuel Cms. Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the flaw in FuelCMS's Forgot Password feature that allows unauthenticated attackers to obtain victim password reset tokens via crafted links.
Mandates secure management of authenticators like password reset tokens, preventing their unauthorized generation or exposure during the reset process.
Validates untrusted inputs from crafted email links and HTTP headers in the password reset mechanism, blocking the poisoning attack vector.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated flaw in a public-facing web application's password reset feature (Host header poisoning), directly enabling exploitation via T1190. Successful token capture leads to account compromise, facilitating T1078 Valid Accounts abuse.
NVD Description
An issue in the Forgot Password feature of Daylight Studio FuelCMS v1.5.2 allows unauthenticated attackers to obtain the password reset token of a victim user via a crafted link placed in a valid e-mail message.
Deeper analysisAI
CVE-2026-30459 affects the Forgot Password feature in Daylight Studio FuelCMS version 1.5.2. The vulnerability enables unauthenticated attackers to obtain a victim user's password reset token through a crafted link embedded in a valid email message. It carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N) and maps to CWE-640.
Unauthenticated attackers (PR:N) can exploit this issue over the network with low complexity by sending a targeted email containing the crafted link. Successful exploitation requires user interaction (UI:R), such as the victim clicking the link, after which the attacker obtains the password reset token. This results in low confidentiality impact but high integrity impact, potentially allowing account compromise.
References for mitigation and further details include vendor sites at http://daylight.com and http://fuelcms.com, the relevant source code in the Login.php controller at https://github.com/daylightstudio/FUEL-CMS/blob/master/fuel/modules/fuel/controllers/Login.php, and a pentest report on password reset poisoning at https://pentest-tools.com/PTT-2025-029-Password-Reset-Poisoning-via-Host-Header.pdf.
Details
- CWE(s)