{"api_version":"1","generated_at":"2026-04-24T02:57:07+00:00","cve":"CVE-2017-5594","urls":{"html":"https://cve.report/CVE-2017-5594","api":"https://cve.report/api/cve/CVE-2017-5594.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-5594","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-5594"},"summary":{"title":"CVE-2017-5594","description":"An issue was discovered in Pagekit CMS before 1.0.11. In this vulnerability the remote attacker is able to reset the registered user's password, when the debug toolbar is enabled. The password is successfully recovered using this exploit. The SecureLayer7 ID is SL7_PGKT_01.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2017-01-25 18:59:00","updated_at":"2021-01-08 13:52:00"},"problem_types":["CWE-640"],"metrics":[],"references":[{"url":"https://securelayer7.net/download/pdf/SecureLayer7-Pentest-report-Pagekit-CMS.pdf","name":"https://securelayer7.net/download/pdf/SecureLayer7-Pentest-report-Pagekit-CMS.pdf","refsource":"MISC","tags":["Technical Description","Third Party Advisory"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"https://securelayer7.net/download/poc/password-reset-vulnerability-exploit-ruby-pagekit-cms.rb.txt","name":"https://securelayer7.net/download/poc/password-reset-vulnerability-exploit-ruby-pagekit-cms.rb.txt","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"","mime":"text/x-ruby","httpstatus":"200","archivestatus":"200"},{"url":"https://www.exploit-db.com/exploits/41143/","name":"41143","refsource":"EXPLOIT-DB","tags":["Exploit","Third Party Advisory","VDB Entry"],"title":"PageKit 1.0.10 - Password Reset - PHP webapps Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/pagekit/pagekit/commit/e0454f9c037c427a5ff76a57e78dbf8cc00c268b","name":"https://github.com/pagekit/pagekit/commit/e0454f9c037c427a5ff76a57e78dbf8cc00c268b","refsource":"MISC","tags":["Patch"],"title":"Merge branch 'release/1.0.11' · pagekit/pagekit@e0454f9 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/95806","name":"95806","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"PageKit CVE-2017-5594 Authentication Bypass Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-5594","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-5594","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"5594","vulnerable":"1","versionEndIncluding":"1.0.10","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pagekit","cpe5":"pagekit","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2017-5594","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in Pagekit CMS before 1.0.11. In this vulnerability the remote attacker is able to reset the registered user's password, when the debug toolbar is enabled. The password is successfully recovered using this exploit. The SecureLayer7 ID is SL7_PGKT_01."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"95806","refsource":"BID","url":"http://www.securityfocus.com/bid/95806"},{"name":"https://securelayer7.net/download/poc/password-reset-vulnerability-exploit-ruby-pagekit-cms.rb.txt","refsource":"MISC","url":"https://securelayer7.net/download/poc/password-reset-vulnerability-exploit-ruby-pagekit-cms.rb.txt"},{"name":"https://github.com/pagekit/pagekit/commit/e0454f9c037c427a5ff76a57e78dbf8cc00c268b","refsource":"MISC","url":"https://github.com/pagekit/pagekit/commit/e0454f9c037c427a5ff76a57e78dbf8cc00c268b"},{"name":"https://securelayer7.net/download/pdf/SecureLayer7-Pentest-report-Pagekit-CMS.pdf","refsource":"MISC","url":"https://securelayer7.net/download/pdf/SecureLayer7-Pentest-report-Pagekit-CMS.pdf"},{"name":"41143","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/41143/"}]}},"nvd":{"publishedDate":"2017-01-25 18:59:00","lastModifiedDate":"2021-01-08 13:52:00","problem_types":["CWE-640"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pagekit:pagekit:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.10","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"5594","Ordinal":"102151","Title":"CVE-2017-5594","CVE":"CVE-2017-5594","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"5594","Ordinal":"1","NoteData":"An issue was discovered in Pagekit CMS before 1.0.11. In this vulnerability the remote attacker is able to reset the registered user's password, when the debug toolbar is enabled. The password is successfully recovered using this exploit. The SecureLayer7 ID is SL7_PGKT_01.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"5594","Ordinal":"2","NoteData":"2017-01-25","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"5594","Ordinal":"3","NoteData":"2017-09-01","Type":"Other","Title":"Modified"}]}}}