VYPR
Medium severity5.3NVD Advisory· Published Mar 6, 2026· Updated Apr 15, 2026

CVE-2018-25177

CVE-2018-25177

Description

Data Center Audit 2.6.2 contains a cross-site request forgery vulnerability that allows attackers to reset administrator passwords without authentication by submitting crafted POST requests. Attackers can send requests to dca_resetpw.php with parameters updateuser, pass, pass2, and submit_reset to change the admin account password and gain administrative access.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Data Center Audit 2.6.2 has a CSRF vulnerability allowing unauthenticated attackers to reset the administrator password via crafted POST requests.

Data Center Audit 2.6.2 suffers from a cross-site request forgery (CSRF) vulnerability in the password reset functionality. The dca_resetpw.php endpoint accepts POST requests with parameters updateuser, pass, pass2, and submit_reset without any anti-CSRF token or session validation, enabling an attacker to forge requests that modify the administrator password [1].

Exploitation requires no prior authentication, as the endpoint does not verify the current password or require the victim to be logged in. An attacker can either directly submit a crafted POST request to dca_resetpw.php or embed a malicious form on a third-party site to trick an authenticated admin into submitting it. The proof-of-concept provided by an exploit researcher demonstrates changing the admin password to an arbitrary value via a simple HTTP POST [1].

Successful exploitation grants the attacker full administrative access to the Data Center Audit web application. This allows them to perform any administrative action, including viewing or modifying audit data, configuring system settings, and potentially gaining further access to the underlying server.

The developer has not released a patched version for this CVE. Users of Data Center Audit 2.6.2 should consider the software end-of-life and migrate to an alternative solution or implement their own CSRF protection by adding tokens and requiring the current password for password changes.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.