{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-50256","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-12-05T20:42:59.378Z","datePublished":"2024-01-03T22:34:47.447Z","dateUpdated":"2025-06-17T20:29:07.539Z"},"containers":{"cna":{"title":"Froxlor username/surname AND company field Bypass","problemTypes":[{"descriptions":[{"cweId":"CWE-20","lang":"en","description":"CWE-20: Improper Input Validation","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/Froxlor/Froxlor/security/advisories/GHSA-625g-fm5w-w7w4","tags":["x_refsource_CONFIRM"],"url":"https://github.com/Froxlor/Froxlor/security/advisories/GHSA-625g-fm5w-w7w4"},{"name":"https://github.com/Froxlor/Froxlor/commit/4b1846883d4828962add91bd844596d89a9c7cac","tags":["x_refsource_MISC"],"url":"https://github.com/Froxlor/Froxlor/commit/4b1846883d4828962add91bd844596d89a9c7cac"},{"name":"https://user-images.githubusercontent.com/80028768/289675319-81ae8ebe-1308-4ee3-bedb-43cdc40da474.mp4","tags":["x_refsource_MISC"],"url":"https://user-images.githubusercontent.com/80028768/289675319-81ae8ebe-1308-4ee3-bedb-43cdc40da474.mp4"}],"affected":[{"vendor":"Froxlor","product":"Froxlor","versions":[{"version":"< 2.1.2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2024-01-03T22:34:47.447Z"},"descriptions":[{"lang":"en","value":"Froxlor is open source server administration software. Prior to version 2.1.2, it was possible to submit the registration form with the essential fields, such as the username and password, left intentionally blank. This inadvertent omission allowed for a bypass of the mandatory field requirements (e.g. surname, company name) established by the system. Version 2.1.2 fixes this issue.\n"}],"source":{"advisory":"GHSA-625g-fm5w-w7w4","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T22:16:46.105Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/Froxlor/Froxlor/security/advisories/GHSA-625g-fm5w-w7w4","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/Froxlor/Froxlor/security/advisories/GHSA-625g-fm5w-w7w4"},{"name":"https://github.com/Froxlor/Froxlor/commit/4b1846883d4828962add91bd844596d89a9c7cac","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/Froxlor/Froxlor/commit/4b1846883d4828962add91bd844596d89a9c7cac"},{"name":"https://user-images.githubusercontent.com/80028768/289675319-81ae8ebe-1308-4ee3-bedb-43cdc40da474.mp4","tags":["x_refsource_MISC","x_transferred"],"url":"https://user-images.githubusercontent.com/80028768/289675319-81ae8ebe-1308-4ee3-bedb-43cdc40da474.mp4"}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-50256","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-01-09T15:34:46.014767Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-17T20:29:07.539Z"}}]}}