CVE-2026-28213

EverShop is a TypeScript-first eCommerce platform. Versions prior to 2.1.1 have a vulnerability in the "Forgot Password" functionality. When specifying a target email address, the API response returns the password reset token. This allows an attacker to take over the associated account. Version 2.1.1 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:evershop:evershop:*:*:*:*:*:node.js:*:*

History

28 Feb 2026, 01:18

Type Values Removed Values Added
CPE cpe:2.3:a:evershop:evershop:*:*:*:*:*:node.js:*:*
First Time Evershop evershop
Evershop
References () https://github.com/evershopcommerce/evershop/releases/tag/v2.1.1 - () https://github.com/evershopcommerce/evershop/releases/tag/v2.1.1 - Product, Release Notes
References () https://github.com/evershopcommerce/evershop/security/advisories/GHSA-cg73-g723-39jw - () https://github.com/evershopcommerce/evershop/security/advisories/GHSA-cg73-g723-39jw - Vendor Advisory

27 Feb 2026, 14:06

Type Values Removed Values Added
Summary
  • (es) EverShop es una plataforma de comercio electrónico TypeScript-first. Versiones anteriores a la 2.1.1 tienen una vulnerabilidad en la funcionalidad de 'Olvidé mi contraseña'. Al especificar una dirección de correo electrónico objetivo, la respuesta de la API devuelve el token de restablecimiento de contraseña. Esto permite a un atacante tomar el control de la cuenta asociada. La versión 2.1.1 soluciona el problema.

26 Feb 2026, 23:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-26 23:16

Updated : 2026-02-28 01:18


NVD link : CVE-2026-28213

Mitre link : CVE-2026-28213

CVE.ORG link : CVE-2026-28213


JSON object : View

Products Affected

evershop

  • evershop
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-640

Weak Password Recovery Mechanism for Forgotten Password