CVE-2026-40588
Received Received - Intake
Password Change Bypass in blueprintUE Enables Account Takeover

Publication date: 2026-04-21

Last updated on: 2026-04-22

Assigner: GitHub, Inc.

Description
blueprintUE is a tool to help Unreal Engine developers. Prior to 4.2.0, the password change form at /profile/{slug}/edit/ does not include a current_password field and does not verify the user's existing password before accepting a new one. Any attacker who obtains a valid authenticated session β€” through XSS exploitation, session sidejacking over HTTP, physical access to a logged-in browser, or a stolen "remember me" cookie β€” can immediately change the account password without knowing the original credential, resulting in permanent account takeover. This vulnerability is fixed in 4.2.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-21
Last Modified
2026-04-22
Generated
2026-05-06
AI Q&A
2026-04-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
blueprintue blueprintue 4.2.0
blueprintue blueprintue to 4.2.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-620 When setting a new password for a user, the product does not require knowledge of the original password, or using another form of authentication.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-40588 is a high-severity vulnerability in blueprintUE versions prior to 4.2.0 where the password change form does not require or verify the user's current password before allowing a new password to be set.

This means that any attacker who has obtained a valid authenticated sessionβ€”through methods like cross-site scripting (XSS), session hijacking over HTTP, physical access to a logged-in browser, or stolen "remember me" cookiesβ€”can change the account password without knowing the original password.

The vulnerability exists because the password change form lacks a 'current_password' input field and the server-side code does not validate the existing password before updating it.

As a result, attackers can immediately take over accounts permanently by changing passwords without authorization.


How can this vulnerability impact me? :

This vulnerability allows attackers with access to a valid authenticated session to change the password and email address of an account without knowing the original password.

The impact is a full and irreversible account takeover, meaning the legitimate user can be locked out permanently.

Attackers can maintain access even if the victim attempts to change their password later, especially if combined with other vulnerabilities like lack of session invalidation.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by verifying if the password change form at the endpoint /profile/{slug}/edit/ lacks a current_password field and if the server-side code does not validate the existing password before allowing a password update.

To detect exploitation attempts on your system, you can monitor HTTP POST requests to the /profile/{slug}/edit/ endpoint that change passwords without including or validating the current password.

Suggested commands to help detect this vulnerability or its exploitation include:

  • Use web server logs or a tool like grep to find POST requests to /profile/*/edit/ that change passwords.
  • Example command to search logs for password change attempts: grep -i 'POST /profile/' /var/log/nginx/access.log | grep '/edit/'
  • Use packet capture tools (e.g., tcpdump or Wireshark) to monitor HTTP traffic for password change requests lacking current_password parameters.
  • Check application source code for the presence of current_password validation in the password change controller (app/controllers/www/ProfileEditController.php), specifically in treatFormChangePassword() and doProcessChangePassword() functions.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Upgrade blueprintUE to version 4.2.0 or later, where this vulnerability is fixed.
  • If upgrading is not immediately possible, restrict access to the password change endpoint to trusted users and monitor for suspicious activity.
  • Invalidate all active sessions and 'remember me' cookies to prevent attackers from using stolen authenticated sessions.
  • Implement additional monitoring and alerting for unusual password change requests.
  • Apply patches or code changes to add a current_password field to the password change form and validate the current password server-side before allowing password updates.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows attackers who obtain a valid authenticated session to change the account password without verifying the current password, resulting in permanent account takeover.

Such unauthorized account takeovers can lead to unauthorized access to personal or sensitive data, which may violate data protection requirements under standards like GDPR and HIPAA.

Failure to properly secure user authentication and prevent unauthorized access could result in non-compliance with these regulations, potentially leading to data breaches and associated legal and financial consequences.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart