info: name: Allegra - Authentication Bypass via Predictable Password Reset Token author: iamnoooob,pdresearch severity: critical description: | Allegra calculateTokenExpDate Password Recovery Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Allegra. Authentication is not required to exploit this vulnerability. The specific flaw exists within the password recovery mechanism. The issue results from reliance upon a predictable value when generating a password reset token. An attacker can leverage this vulnerability to bypass authentication on the application. impact: | An attacker can exploit this vulnerability to bypass authentication and gain unauthorized access to the application, potentially compromising sensitive data and system integrity. remediation: | Upgrade Allegra to version 8.1.4or7.5.2or later to fix the predictable password reset token vulnerability. reference: - https://www.zerodayinitiative.com/advisories/ZDI-25-410/ - https://alltena.com/en/resources/release-notes/release-notes-for-release-8-1-4-and-release-7-5-2 - https://nvd.nist.gov/vuln/detail/CVE-2025-6216 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score:9.8 cve-id: CVE-2025-6216 cwe-id: CWE-640 cpe: cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:* metadata: verified:true max-request:1 vendor: alltena product: allegra shodan-query: http.favicon.hash:"284403119" fofa-query: icon_hash="284403119" tags: cve,cve2025,allegra,auth-bypass,predictable-token,reset
variables: email:"admin@mydomainxxx.com"# Change to a test account