VYPR
High severityNVD Advisory· Published Dec 11, 2025· Updated Apr 15, 2026

CVE-2025-67719

CVE-2025-67719

Description

Ibexa is a composable end-to-end DXP (Digital Experience Platform). Versions 5.0.0-beta1 through 5.0.3 do not have password validation. During the transition from v4 to v5 an error was introduced into validation code which causes the validation of the previous password not to run as expected. This makes it possible for a logged in user to change their password in the back office without knowing the previous password. For example, if a user logs into their account and walks away without locking their workstation, an attacker could access the unattended session and change the password, therefore locking the legitimate user out. This issue is fixed in version 5.0.4.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ibexa/userPackagist
>= 5.0.0-beta1, < 5.0.45.0.4

Affected products

1

Patches

1
9d485bf385e6

Merge remote-tracking branch 'security/main'

https://github.com/ibexa/userGunnstein LyeDec 10, 2025via ghsa
1 file changed · +4 4
  • src/lib/Form/Data/UserPasswordChangeData.php+4 4 modified
    @@ -14,10 +14,10 @@
     class UserPasswordChangeData
     {
         public function __construct(
    -        /**
    -         * @UserAssert\UserPassword()
    -         */
    -        #[Assert\NotBlank]
    +        #[Assert\Sequentially([
    +            new Assert\NotBlank(),
    +            new UserAssert\UserPassword(),
    +        ])]
             private ?string $oldPassword = null,
             #[Assert\NotBlank]
             private ?string $newPassword = null
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.