LIVE NEWSROOM · --:-- · May 25, 2026
A LIBRARY FOR SECURITY RESEARCHERS

CWE WEAKNESSES  /  CWE-620

CWE-620

Unverified Password Change

Base

What it is

When setting a new password for a user, the product does not require knowledge of the original password, or using another form of authentication.

This could be used by an attacker to change passwords for another user, thus gaining the privileges associated with that user.

Impact

Access ControlBypass Protection Mechanism, Gain Privileges or Assume Identity

Mitigations

  • [Architecture and Design] When prompting for a password change, force the user to provide the original password in addition to the new password.
  • [Architecture and Design] Do not use "forgotten password" functionality. But if you must, ensure that you are only providing information to the actual user, e.g. by using an email address or challenge question that the legitimate user already provided in the past; do not allow the current user to change this identity information until the correct password has been provided.

Real-world CVE examples

  • CVE-2025-4903 — Router web interface allows unverified password change
  • CVE-2007-0681 — Web app allows remote attackers to change the passwords of arbitrary users without providing the original password, and possibly perform other unauthorized acti
  • CVE-2000-0944 — Web application password change utility doesn't check the original password.

Related weaknesses

Test & detect

Browse all common weaknesses, check related exploited CVEs, or map to ATT&CK techniques.

Source: MITRE CWE. View on cwe.mitre.org →

Scroll to Top