CVE-2023-31286
C# vulnerability analysis and mitigation

Overview

An issue was discovered in Serenity Serene (and StartSharp) before version 6.7.0. When a password reset request occurs, the server response leaks the existence of users through the 'forgot password' function of the application. This vulnerability allows attackers to collect valid email addresses, which can be used to increase the efficiency of brute-force attacks (SEC Consult, NVD).

Technical details

The vulnerability exists in the password reset functionality where the server provides different responses based on whether an email exists or not. When sending a POST request to /Account/ForgotPassword with an email address, the server returns a 400 Bad Request with an error message for non-existent users and a 200 OK response for existing users. This information disclosure allows attackers to enumerate valid user accounts. The vulnerability has been assigned a CVSS v3.1 Base Score of 5.3 (Medium) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N (NVD).

Impact

The vulnerability enables attackers to identify valid user accounts in the system. This information can be leveraged to conduct more targeted attacks, such as password brute-forcing or social engineering attempts against confirmed users of the system (SEC Consult).

Mitigation and workarounds

The vulnerability has been fixed in version 6.7.0 and later. The vendor recommends users either create a new project from the 6.7.0+ template or manually apply the relevant changes after updating Serenity packages. The fix ensures that the Forgot password page does not reveal information about whether a user with the entered email exists (GitHub Patch).

Community reactions

The vulnerability was discovered by Fabian Densborn from SEC Consult Vulnerability Lab. Serenity.is expressed gratitude to Fabian Densborn for his discovery, analysis, and coordination, as well as the SEC Consult Vulnerability Lab for responsibly reporting the identified issues (SEC Consult).

Additional resources


SourceThis report was generated using AI

Related C# vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-64095CRITICAL9.8
  • C#C#
  • DNN.PLATFORM
NoYesOct 28, 2025
CVE-2025-64113CRITICAL9.3
  • C#C#
  • MediaBrowser.Server.Core
NoYesDec 09, 2025
CVE-2025-66631HIGH7.2
  • C#C#
  • Csla
NoYesDec 09, 2025
CVE-2025-66625MEDIUM4.9
  • C#C#
  • Umbraco.Cms
NoYesDec 09, 2025
CVE-2025-65955MEDIUM4.9
  • C#C#
  • Magick.NET-Q8-OpenMP-arm64
NoYesDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management