- Description
- Mantis Bug Tracker (MantisBT) is an open source issue tracker. Due to incorrect use of loose (==) instead of strict (===) comparison in the authentication code in versions 2.27.1 and below.PHP type juggling will cause certain MD5 hashes matching scientific notation to be interpreted as numbers. Instances using the MD5 login method allow an attacker who knows the victim's username and has access to an account with a password hash that evaluates to zero to log in without knowing the victim's actual password, by using any other password with a hash that also evaluates to zero This issue is fixed in version 2.27.2.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- mantisbt
CVSS 4.0
- Type
- Secondary
- Base score
- 8.8
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- HIGH
CVSS 3.1
- Type
- Primary
- Base score
- 9.1
- Impact score
- 5.2
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
- Severity
- CRITICAL
- security-advisories@github.com
- CWE-305
- Hype score
- Not currently trending
CVE-2025-47776 Mantis Bug Tracker (MantisBT) is an open source issue tracker. Due to incorrect use of loose (==) instead of strict (===) comparison in the authentication code in ver… https://t.co/dZvVpO3LnH
@CVEnew
4 Nov 2025
240 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-47776 - 1day, MantisBT vulnerable to authentication bypass for some passwords due to PHP type juggling #Pruva today reproduction and exploit. https://t.co/JgHs3JesKH Advs: https://t.co/JMfemPPV9G https://t.co/hNCNNsPYxI
@N3mes1s
4 Nov 2025
2256 Impressions
6 Retweets
29 Likes
12 Bookmarks
1 Reply
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B49EF21D-F412-4C89-BFA8-9606F204E310",
"versionEndExcluding": "2.27.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]