CVE-2025-22144

9.8 CRITICAL

📋 TL;DR

This vulnerability in NamelessMC allows attackers with admincp.core.emails or admincp.users.edit permissions to reset user passwords and take over accounts. When accounts are manually validated by privileged users, the password reset code becomes empty instead of NULL, enabling unauthorized password resets. All NamelessMC installations below version 2.1.3 are affected.

💻 Affected Systems

Products:
  • NamelessMC
Versions: All versions below 2.1.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires users with admincp.core.emails or admincp.users.edit permissions to be present in the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover of any user by privileged insiders or compromised admin accounts, leading to data theft, privilege escalation, and potential server compromise.

🟠

Likely Case

Privileged users abusing their permissions to reset passwords and hijack accounts of other users, particularly targeting administrators or moderators.

🟢

If Mitigated

Limited to authorized administrators with specific permissions, but still represents a significant insider threat vector.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with specific admin permissions. The vulnerability is straightforward to exploit once the attacker has the required permissions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.3

Vendor Advisory: https://github.com/NamelessMC/Nameless/security/advisories/GHSA-p883-7496-x35p

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download NamelessMC v2.1.3 from the official GitHub releases. 3. Replace all files except the 'uploads' directory and 'core/config.php'. 4. Clear your browser cache and test functionality.

🔧 Temporary Workarounds

No workarounds available

all

The vendor advisory states there are no known workarounds for this vulnerability.

🧯 If You Can't Patch

  • Immediately revoke admincp.core.emails and admincp.users.edit permissions from all non-essential users
  • Implement strict monitoring of admin account activity and password reset logs

🔍 How to Verify

Check if Vulnerable:

Check your NamelessMC version by viewing the footer on any admin page or checking the 'core/version.php' file. If version is below 2.1.3, you are vulnerable.

Check Version:

cat core/version.php | grep '\$version'

Verify Fix Applied:

After upgrading, verify the version shows 2.1.3 in the admin interface footer and test that password reset functionality works correctly.

📡 Detection & Monitoring

Log Indicators:

  • Multiple password reset requests for different users from same admin account
  • Unusual password reset activity from admin accounts
  • Password reset attempts with empty reset codes

Network Indicators:

  • HTTP requests to /nameless/index.php?route=/forgot_password/&c= with empty or manipulated parameters

SIEM Query:

source="nameless_logs" AND (uri_path="/forgot_password" AND query_string="c=") OR (event_type="password_reset" AND admin_user!=null)

🔗 References

📤 Share & Export