CVE-2025-42615

Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
08/12/2025
Last modified:
08/12/2025

Description

In affected versions, vulnerability-lookup did not track or limit failed<br /> One-Time Password (OTP) attempts during Two-Factor Authentication (2FA)<br /> verification. An attacker who already knew or guessed a valid username <br /> and password could submit an arbitrary number of OTP codes without <br /> causing the account to be locked or generating any specific alert for <br /> administrators.<br /> <br /> <br /> This lack of rate-limiting and lockout on OTP failures significantly <br /> lowers the cost of online brute-force attacks against 2FA codes and <br /> increases the risk of successful account takeover, especially if OTP <br /> entropy is reduced (e.g. short numeric codes, user reuse, or predictable<br /> tokens). Additionally, administrators had no direct visibility into <br /> accounts experiencing repeated 2FA failures, making targeted attacks <br /> harder to detect and investigate.<br /> <br /> <br /> The patch introduces a persistent failed_otp_attempts counter on user <br /> accounts, locks the user after 5 invalid OTP submissions, resets the <br /> counter on successful verification, and surfaces failed 2FA attempts in <br /> the admin user list. This enforces an account lockout policy for OTP <br /> brute-force attempts and improves monitoring capabilities for suspicious<br /> 2FA activity.This issue affects Vulnerability-Lookup: before 2.18.0.

References to Advisories, Solutions, and Tools