Mantis Bug Tracker (MantisBT) is an open source issue tracker. Due to incorrect use of loose (==) instead of strict (===) comparison in the authentication code in versions 2.27.1 and below.PHP type juggling will cause certain MD5 hashes matching scientific notation to be interpreted as numbers. Instances using the MD5 login method allow an attacker who knows the victim's username and has access to an account with a password hash that evaluates to zero to log in without knowing the victim's actual password, by using any other password with a hash that also evaluates to zero This issue is fixed in version 2.27.2.
References
| Link | Resource |
|---|---|
| https://github.com/mantisbt/mantisbt/commit/966554a19cf1bdbcfbfb3004766979faa748f9a2 | Patch |
| https://github.com/mantisbt/mantisbt/security/advisories/GHSA-4v8w-gg5j-ph37 | Vendor Advisory Issue Tracking Mitigation |
Configurations
History
10 Nov 2025, 17:59
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:* | |
| First Time |
Mantisbt mantisbt
Mantisbt |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
| References | () https://github.com/mantisbt/mantisbt/commit/966554a19cf1bdbcfbfb3004766979faa748f9a2 - Patch | |
| References | () https://github.com/mantisbt/mantisbt/security/advisories/GHSA-4v8w-gg5j-ph37 - Vendor Advisory, Issue Tracking, Mitigation |
04 Nov 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-04 21:15
Updated : 2025-11-10 17:59
NVD link : CVE-2025-47776
Mitre link : CVE-2025-47776
CVE.ORG link : CVE-2025-47776
JSON object : View
Products Affected
mantisbt
- mantisbt
CWE
CWE-305
Authentication Bypass by Primary Weakness
