{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-6533","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-06-23T14:32:23.248Z","datePublished":"2025-06-24T00:00:12.882Z","dateUpdated":"2025-06-25T15:02:40.680Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-06-24T00:00:12.882Z"},"title":"xxyopen/201206030 novel-plus CATCHA LoginController.java ajaxLogin authentication replay","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-294","lang":"en","description":"Authentication Bypass by Capture-replay"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-287","lang":"en","description":"Improper Authentication"}]}],"affected":[{"vendor":"xxyopen","product":"novel-plus","versions":[{"version":"5.1.0","status":"affected"},{"version":"5.1.1","status":"affected"},{"version":"5.1.2","status":"affected"},{"version":"5.1.3","status":"affected"}],"modules":["CATCHA Handler"]},{"vendor":"201206030","product":"novel-plus","versions":[{"version":"5.1.0","status":"affected"},{"version":"5.1.1","status":"affected"},{"version":"5.1.2","status":"affected"},{"version":"5.1.3","status":"affected"}],"modules":["CATCHA Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, has been found in xxyopen/201206030 novel-plus up to 5.1.3. Affected by this issue is the function ajaxLogin of the file novel-admin/src/main/java/com/java2nb/system/controller/LoginController.java of the component CATCHA Handler. The manipulation leads to authentication bypass by capture-replay. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine kritische Schwachstelle wurde in xxyopen/201206030 novel-plus bis 5.1.3 entdeckt. Dies betrifft die Funktion ajaxLogin der Datei novel-admin/src/main/java/com/java2nb/system/controller/LoginController.java der Komponente CATCHA Handler. Durch das Beeinflussen mit unbekannten Daten kann eine authentication bypass by capture-replay-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Die Komplexität eines Angriffs ist eher hoch. Sie ist schwierig ausnutzbar. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.3,"vectorString":"CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.6,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.6,"vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.1,"vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-06-23T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-06-23T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-06-23T16:37:35.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"bpy9ft (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.313652","name":"VDB-313652 | xxyopen/201206030 novel-plus CATCHA LoginController.java ajaxLogin authentication replay","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.313652","name":"VDB-313652 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.596481","name":"Submit #596481 | xxyopen novel-plus 5.1.3 Improper Restriction of Excessive Authentication Attempts","tags":["third-party-advisory"]},{"url":"https://blog.0xd00.com/blog/captcha-replay-attack-lead-to-brute-force-protection-bypass","tags":["related"]},{"url":"https://blog.0xd00.com/blog/captcha-replay-attack-lead-to-brute-force-protection-bypass#poc","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://blog.0xd00.com/blog/captcha-replay-attack-lead-to-brute-force-protection-bypass","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-25T14:53:09.187955Z","id":"CVE-2025-6533","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-25T15:02:40.680Z"}}]}}