CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 21, 2026

CVE-2026-40585 | blueprintue blueprintue-self-hosted-edition up to 4.1.x Password Reset findUserIDFromEmailAndToken password recovery (GHSA-qr65-6vp8-whjf)

VulDB Archived Apr 21, 2026 ✓ Full text saved

A vulnerability categorized as problematic has been discovered in blueprintue blueprintue-self-hosted-edition up to 4.1.x . Affected by this vulnerability is the function findUserIDFromEmailAndToken of the component Password Reset Handler . Executing a manipulation can lead to weak password recovery. The identification of this vulnerability is CVE-2026-40585 . The attack may be launched remotely. There is no exploit available. It is advisable to upgrade the affected component.

Full text archived locally
✦ AI Summary · Claude Sonnet


    VDB-358535 · CVE-2026-40585 · GHSA-QR65-6VP8-WHJF BLUEPRINTUE BLUEPRINTUE-SELF-HOSTED-EDITION UP TO 4.1.X PASSWORD RESET FINDUSERIDFROMEMAILANDTOKEN PASSWORD RECOVERY HISTORYDIFFRELATEJSONXMLCTI CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score 6.4 $0-$5k 1.74+ Summaryinfo A vulnerability identified as problematic has been detected in blueprintue blueprintue-self-hosted-edition up to 4.1.x. Affected by this issue is the function findUserIDFromEmailAndToken of the component Password Reset Handler. The manipulation leads to password recovery. This vulnerability is referenced as CVE-2026-40585. Remote exploitation of the attack is possible. No exploit is available. You should upgrade the affected component. Detailsinfo A vulnerability, which was classified as problematic, has been found in blueprintue blueprintue-self-hosted-edition up to 4.1.x. This issue affects the function findUserIDFromEmailAndToken of the component Password Reset Handler. The manipulation with an unknown input leads to a password recovery vulnerability. Using CWE to declare the problem leads to CWE-640. The product contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak. Impacted is confidentiality, integrity, and availability. The summary by CVE is: blueprintUE is a tool to help Unreal Engine developers. Prior to 4.2.0, when a password reset is initiated, a 128-character CSPRNG token is generated and stored alongside a password_reset_at timestamp. However, the token redemption function findUserIDFromEmailAndToken() queries only for a matching email + password_reset token pair — it does not check whether the password_reset_at timestamp has elapsed any maximum window. A generated reset token is valid indefinitely until it is explicitly consumed or overwritten by a subsequent reset request. This vulnerability is fixed in 4.2.0. It is possible to read the advisory at github.com. The identification of this vulnerability is CVE-2026-40585 since 04/14/2026. The exploitation is known to be difficult. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details of the vulnerability are known, but there is no available exploit. The attack technique deployed by this issue is T1552 according to MITRE ATT&CK. Upgrading to version 4.2.0 eliminates this vulnerability. Productinfo Vendor blueprintue Name blueprintue-self-hosted-edition Version 4.0 4.1 Website Product: https://github.com/blueprintue/blueprintue-self-hosted-edition/ CPE 2.3info 🔒 🔒 CPE 2.2info 🔒 🔒 CVSSv4info VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv3info VulDB Meta Base Score: 6.5 VulDB Meta Temp Score: 6.4 VulDB Base Score: 5.6 VulDB Temp Score: 5.4 VulDB Vector: 🔒 VulDB Reliability: 🔍 CNA Base Score: 7.4 CNA Vector (GitHub_M): 🔒 CVSSv2info Vector Complexity Authentication Confidentiality Integrity Availability Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock VulDB Base Score: 🔒 VulDB Temp Score: 🔒 VulDB Reliability: 🔍 Exploitinginfo Class: Password recovery CWE: CWE-640 CAPEC: 🔒 ATT&CK: 🔒 Physical: No Local: No Remote: Yes Availability: 🔒 Status: Not defined Price Prediction: 🔍 Current Price Estimation: 🔒 0-Day Unlock Unlock Unlock Unlock Today Unlock Unlock Unlock Unlock Threat Intelligenceinfo Interest: 🔍 Active Actors: 🔍 Active APT Groups: 🔍 Countermeasuresinfo Recommended: Upgrade Status: 🔍 0-Day Time: 🔒 Upgrade: blueprintue-self-hosted-edition 4.2.0 Timelineinfo 04/14/2026 CVE reserved 04/21/2026 +7 days Advisory disclosed 04/21/2026 +0 days VulDB entry created 04/21/2026 +0 days VulDB entry last update Sourcesinfo Product: github.com Advisory: GHSA-qr65-6vp8-whjf Status: Confirmed CVE: CVE-2026-40585 (🔒) GCVE (CVE): GCVE-0-2026-40585 GCVE (VulDB): GCVE-100-358535 Entryinfo Created: 04/21/2026 19:41 Changes: 04/21/2026 19:41 (65) Complete: 🔍 Cache ID: 99:8C7:101 Discussion No comments yet. Languages: en. Please log in to comment. ◂ PreviousOverviewNext ▸
    💬 Team Notes
    Article Info
    Source
    VulDB
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 21, 2026
    Archived
    Apr 21, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗