{"id":"CVE-2022-40084","details":"OpenCRX before v5.2.2 was discovered to be vulnerable to password enumeration due to the difference in error messages received during a password reset which could enable an attacker to determine if a username, email or ID is valid.","aliases":["GHSA-j5v3-363p-g843"],"modified":"2025-11-20T12:07:45.196948Z","published":"2022-10-20T14:15:09.897Z","references":[{"type":"WEB","url":"https://cwe.mitre.org/data/definitions/204.html#:~:text=User%20enumeration%20via%20discrepancies%20in%20error%20messages.%2C-CVE-2004-0294&text=Bulletin%20Board%20displays%20different%20error%2Cbrute%20force%20password%20guessing%20attack."},{"type":"EVIDENCE","url":"https://github.com/ciph0x01/OpenCRX-CVE/blob/main/CVE-2022-40084.md"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/opencrx/opencrx","events":[{"introduced":"0"},{"last_affected":"b3a2556e7b2b24a681f1b578030d232686e4accf"}]}],"versions":["opencrx-v4.0.0","opencrx-v4.1.0","opencrx-v4.2.0","opencrx-v4.3.0","opencrx-v4.3.0-rc.1","opencrx-v5.0-20200714","opencrx-v5.0-20200715","opencrx-v5.0-20200717","opencrx-v5.0-20200904","opencrx-v5.0.0","opencrx-v5.0.1","opencrx-v5.1.0","opencrx-v5.2.0","opencrx-v5.2.1","opencrx-v5.2.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-40084.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}