{"id":"CVE-2020-7245","details":"Incorrect username validation in the registration process of CTFd v2.0.0 - v2.2.2 allows an attacker to take over an arbitrary account if the username is known and emails are enabled on the CTFd instance. To exploit the vulnerability, one must register with a username identical to the victim's username, but with white space inserted before and/or after the username. This will register the account with the same username as the victim. After initiating a password reset for the new account, CTFd will reset the victim's account password due to the username collision.","modified":"2026-02-12T07:34:36.152202Z","published":"2020-01-23T23:15:11.597Z","references":[{"type":"ADVISORY","url":"https://github.com/CTFd/CTFd/pull/1218"},{"type":"ADVISORY","url":"https://github.com/CTFd/CTFd/releases/tag/2.2.3"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ctfd/ctfd","events":[{"introduced":"0"},{"fixed":"d59bfa3578b0e5ac8dd3570038d123014372a81c"}]}],"versions":["1.0.0","1.0.1","1.0.2","1.0.3","1.0.4","1.0.5","1.1.0","1.1.1","1.1.2","1.1.3","1.1.4","1.2.0","2.0.0","2.0.1","2.0.2","2.0.3","2.0.4","2.0.5","2.0.6","2.1.0","2.1.1","2.1.2","2.1.3","2.1.4","2.1.5","2.2.0","2.2.1","2.2.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-7245.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}