VYPR
Unrated severityNVD Advisory· Published May 23, 2026

userSpice 4.3.24 Username Enumeration via existingUsernameCheck.php

CVE-2018-25350

Description

userSpice 4.3.24 contains a username enumeration vulnerability that allows unauthenticated attackers to discover valid usernames by sending POST requests to the existingUsernameCheck.php endpoint. Attackers can submit usernames and analyze response text for the 'taken' string to identify existing accounts in the system.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

userSpice 4.3.24 allows unauthenticated attackers to enumerate valid usernames via the existingUsernameCheck.php endpoint by checking for 'taken' in the response.

Vulnerability

The vulnerability exists in userSpice 4.3.24 (and possibly earlier versions) in the file /users/parsers/existingUsernameCheck.php. This endpoint accepts POST requests with a username parameter and returns a response containing the string 'taken' if the username exists, or a different response otherwise. No authentication is required to access this endpoint. The issue is classified as CWE-204 (Observable Response Discrepancy) [1]. Affected versions: userSpice <= 4.3.24.

Exploitation

An unauthenticated attacker sends a POST request to existingUsernameCheck.php with a username parameter. The attacker then inspects the response body for the substring 'taken'. If present, the username is valid. The exploit script provided in [2] demonstrates this process: it reads a list of usernames from a file, sends a request for each, and prints [FOUND] when the response contains 'taken'. No special network position or user interaction is required.

Impact

An attacker can enumerate valid usernames on the system. This information can be leveraged for further attacks such as brute-force password guessing, credential stuffing, or targeted phishing. The CVSS v4 score is 9.3 (Critical) per [1], indicating high impact on confidentiality, integrity, and availability due to the potential for account compromise.

Mitigation

As of the available references, no official patch has been released for userSpice 4.3.24. Users should upgrade to a newer version if available, or implement server-side input validation and consistent error messages to eliminate response discrepancies. The vendor website is www.userspice.com. The vulnerability is not listed on CISA's Known Exploited Vulnerabilities (KEV) catalog as of the publication date.

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.