Vulnerability Details CVE-2025-43863
vantage6 is an open source framework built to enable, manage and deploy privacy enhancing technologies like Federated Learning and Multi-Party Computation. If attacker gets access to an authenticated session, they can try to brute-force the user password by using the change password functionality: they can call that route infinitely which will return the message that password is wrong until it is correct. This vulnerability is fixed in 4.11.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 13.7%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2025-43863
-
cpe:2.3:a:vantage6:vantage6:-
-
cpe:2.3:a:vantage6:vantage6:0.0.0
-
cpe:2.3:a:vantage6:vantage6:2.3.5
-
cpe:2.3:a:vantage6:vantage6:3.10.0
-
cpe:2.3:a:vantage6:vantage6:3.10.1
-
cpe:2.3:a:vantage6:vantage6:3.10.2
-
cpe:2.3:a:vantage6:vantage6:3.10.3
-
cpe:2.3:a:vantage6:vantage6:3.10.4
-
cpe:2.3:a:vantage6:vantage6:3.11.0
-
cpe:2.3:a:vantage6:vantage6:3.11.1
-
cpe:2.3:a:vantage6:vantage6:3.3.0
-
cpe:2.3:a:vantage6:vantage6:3.3.3
-
cpe:2.3:a:vantage6:vantage6:3.3.8
-
cpe:2.3:a:vantage6:vantage6:3.4.0
-
cpe:2.3:a:vantage6:vantage6:3.4.1
-
cpe:2.3:a:vantage6:vantage6:3.4.2
-
cpe:2.3:a:vantage6:vantage6:3.5.0
-
cpe:2.3:a:vantage6:vantage6:3.6.1
-
cpe:2.3:a:vantage6:vantage6:3.7.0
-
cpe:2.3:a:vantage6:vantage6:3.8.0
-
cpe:2.3:a:vantage6:vantage6:3.8.1
-
cpe:2.3:a:vantage6:vantage6:3.8.2
-
cpe:2.3:a:vantage6:vantage6:3.8.3
-
cpe:2.3:a:vantage6:vantage6:3.8.4
-
cpe:2.3:a:vantage6:vantage6:3.8.5
-
cpe:2.3:a:vantage6:vantage6:3.8.6
-
cpe:2.3:a:vantage6:vantage6:3.8.7
-
cpe:2.3:a:vantage6:vantage6:3.8.8
-
cpe:2.3:a:vantage6:vantage6:3.9.0
-
cpe:2.3:a:vantage6:vantage6:4.0.0
-
cpe:2.3:a:vantage6:vantage6:4.0.1
-
cpe:2.3:a:vantage6:vantage6:4.0.2
-
cpe:2.3:a:vantage6:vantage6:4.0.3
-
cpe:2.3:a:vantage6:vantage6:4.1.0
-
cpe:2.3:a:vantage6:vantage6:4.1.1
-
cpe:2.3:a:vantage6:vantage6:4.1.2
-
cpe:2.3:a:vantage6:vantage6:4.1.3
-
cpe:2.3:a:vantage6:vantage6:4.10.0
-
cpe:2.3:a:vantage6:vantage6:4.10.1
-
cpe:2.3:a:vantage6:vantage6:4.10.2
-
cpe:2.3:a:vantage6:vantage6:4.2.0
-
cpe:2.3:a:vantage6:vantage6:4.2.1
-
cpe:2.3:a:vantage6:vantage6:4.2.2
-
cpe:2.3:a:vantage6:vantage6:4.2.3
-
cpe:2.3:a:vantage6:vantage6:4.3.0
-
cpe:2.3:a:vantage6:vantage6:4.3.1
-
cpe:2.3:a:vantage6:vantage6:4.3.2
-
cpe:2.3:a:vantage6:vantage6:4.3.3
-
cpe:2.3:a:vantage6:vantage6:4.3.4
-
cpe:2.3:a:vantage6:vantage6:4.4.0
-
cpe:2.3:a:vantage6:vantage6:4.4.1
-
cpe:2.3:a:vantage6:vantage6:4.5.0
-
cpe:2.3:a:vantage6:vantage6:4.5.1
-
cpe:2.3:a:vantage6:vantage6:4.5.2
-
cpe:2.3:a:vantage6:vantage6:4.5.3
-
cpe:2.3:a:vantage6:vantage6:4.5.4
-
cpe:2.3:a:vantage6:vantage6:4.5.5
-
cpe:2.3:a:vantage6:vantage6:4.6.0
-
cpe:2.3:a:vantage6:vantage6:4.6.1
-
cpe:2.3:a:vantage6:vantage6:4.7.0
-
cpe:2.3:a:vantage6:vantage6:4.7.1
-
cpe:2.3:a:vantage6:vantage6:4.8.0
-
cpe:2.3:a:vantage6:vantage6:4.8.1
-
cpe:2.3:a:vantage6:vantage6:4.8.2
-
cpe:2.3:a:vantage6:vantage6:4.9.0
-
cpe:2.3:a:vantage6:vantage6:4.9.1