The password change endpoint in Open Source Point of Sale 3.4.1 allows users to set their account password to an empty string due to missing server-side validation. When an authenticated user omits or leaves the `password` and `repeat_password` parameters empty in the password change request, the backend still returns a successful response and sets the password to an empty string. This effectively disables authentication and may allow unauthorized access to user or administrative accounts.
References
| Link | Resource |
|---|---|
| https://github.com/omkaryepre/vulnerability-research/tree/main/CVE-2025-63800 | Exploit Third Party Advisory |
| https://github.com/opensourcepos/opensourcepos | Product |
| https://opensourcepos.org/ | Product |
Configurations
History
No history.
Information
Published : 2025-11-18 16:15
Updated : 2025-12-19 16:51
NVD link : CVE-2025-63800
Mitre link : CVE-2025-63800
CVE.ORG link : CVE-2025-63800
JSON object : View
Products Affected
opensourcepos
- open_source_point_of_sale
CWE
CWE-521
Weak Password Requirements
