Taguette is an open source qualitative research tool. An issue has been discovered in Taguette versions prior to 1.5.0. It was possible for an attacker to request password reset email containing a malicious link, allowing the attacker to set the email if clicked by the victim. This issue has been patched in version 1.5.0.
References
| Link | Resource |
|---|---|
| https://github.com/remram44/taguette/security/advisories/GHSA-7rc8-5c8q-jr6j | Issue Tracking Vendor Advisory |
| https://gitlab.com/remram44/taguette/-/issues/331 | Issue Tracking Vendor Advisory |
Configurations
History
30 Oct 2025, 17:00
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/remram44/taguette/security/advisories/GHSA-7rc8-5c8q-jr6j - Issue Tracking, Vendor Advisory | |
| References | () https://gitlab.com/remram44/taguette/-/issues/331 - Issue Tracking, Vendor Advisory | |
| CPE | cpe:2.3:a:taguette:taguette:*:*:*:*:*:*:*:* | |
| First Time |
Taguette taguette
Taguette |
20 Oct 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-20 20:15
Updated : 2025-10-30 17:00
NVD link : CVE-2025-62527
Mitre link : CVE-2025-62527
CVE.ORG link : CVE-2025-62527
JSON object : View
Products Affected
taguette
- taguette
CWE
CWE-15
External Control of System or Configuration Setting
