
Cloud Vulnerability DB
A community-led vulnerabilities database
Taguette, an open source qualitative research tool, was found to contain a vulnerability (CVE-2025-62527) in versions prior to 1.5.0. The vulnerability allows an attacker to request password reset emails containing malicious links, which if clicked by victims, enables the attacker to modify email settings. This security issue was discovered and disclosed on October 20, 2025 (GitHub Advisory).
The vulnerability has been assigned a CVSS v3.1 base score of 7.1 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N. The technical assessment indicates that the vulnerability requires network access but low attack complexity, with no privileges required. However, it does require user interaction for successful exploitation. The vulnerability has been classified as CWE-15 (External Control of System or Configuration Setting), indicating that system settings or configuration elements can be externally controlled by a user (GitHub Advisory).
The vulnerability has significant impact on confidentiality (rated High) and some impact on integrity (rated Low), while having no direct impact on system availability. If successfully exploited, an attacker could manipulate email settings through malicious password reset links, potentially compromising user account security (GitHub Advisory).
The vulnerability has been patched in Taguette version 1.5.0. Users are strongly advised to upgrade to this version to protect against this security issue (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."