Mantis Bug Tracker (MantisBT) is an open source issue tracker. Due to incorrect use of loose (==) instead of strict (===) comparison in the authentication code in versions 2.27.1 and below.PHP type juggling will cause certain MD5 hashes matching scientific notation to be interpreted as numbers. Instances using the MD5 login method allow an attacker who knows the victim's username and has access to an account with a password hash that evaluates to zero to log in without knowing the victim's actual password, by using any other password with a hash that also evaluates to zero This issue is fixed in version 2.27.2.
References
| Link | Resource |
|---|---|
| https://github.com/mantisbt/mantisbt/commit/966554a19cf1bdbcfbfb3004766979faa748f9a2 | Patch |
| https://github.com/mantisbt/mantisbt/security/advisories/GHSA-4v8w-gg5j-ph37 | Issue Tracking Mitigation Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-11-04 21:15
Updated : 2025-11-10 17:59
NVD link : CVE-2025-47776
Mitre link : CVE-2025-47776
CVE.ORG link : CVE-2025-47776
JSON object : View
Products Affected
mantisbt
- mantisbt
CWE
CWE-305
Authentication Bypass by Primary Weakness
