CVE-2025-47776

Mantis Bug Tracker (MantisBT) is an open source issue tracker. Due to incorrect use of loose (==) instead of strict (===) comparison in the authentication code in versions 2.27.1 and below.PHP type juggling will cause certain MD5 hashes matching scientific notation to be interpreted as numbers. Instances using the MD5 login method allow an attacker who knows the victim's username and has access to an account with a password hash that evaluates to zero to log in without knowing the victim's actual password, by using any other password with a hash that also evaluates to zero This issue is fixed in version 2.27.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*

History

10 Nov 2025, 17:59

Type Values Removed Values Added
CPE cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*
First Time Mantisbt mantisbt
Mantisbt
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
References () https://github.com/mantisbt/mantisbt/commit/966554a19cf1bdbcfbfb3004766979faa748f9a2 - () https://github.com/mantisbt/mantisbt/commit/966554a19cf1bdbcfbfb3004766979faa748f9a2 - Patch
References () https://github.com/mantisbt/mantisbt/security/advisories/GHSA-4v8w-gg5j-ph37 - () https://github.com/mantisbt/mantisbt/security/advisories/GHSA-4v8w-gg5j-ph37 - Vendor Advisory, Issue Tracking, Mitigation

04 Nov 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-04 21:15

Updated : 2025-11-10 17:59


NVD link : CVE-2025-47776

Mitre link : CVE-2025-47776

CVE.ORG link : CVE-2025-47776


JSON object : View

Products Affected

mantisbt

  • mantisbt
CWE
CWE-305

Authentication Bypass by Primary Weakness