Vulnerability Description
blueprintUE is a tool to help Unreal Engine developers. Prior to 4.2.0, when a password reset is initiated, a 128-character CSPRNG token is generated and stored alongside a password_reset_at timestamp. However, the token redemption function findUserIDFromEmailAndToken() queries only for a matching email + password_reset token pair — it does not check whether the password_reset_at timestamp has elapsed any maximum window. A generated reset token is valid indefinitely until it is explicitly consumed or overwritten by a subsequent reset request. This vulnerability is fixed in 4.2.0.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/blueprintue/blueprintue-self-hosted-edition/security/advisori
- https://github.com/blueprintue/blueprintue-self-hosted-edition/security/advisori
FAQ
What is CVE-2026-40585?
CVE-2026-40585 is a vulnerability with a CVSS score of 7.4 (HIGH). blueprintUE is a tool to help Unreal Engine developers. Prior to 4.2.0, when a password reset is initiated, a 128-character CSPRNG token is generated and stored alongside a password_reset_at timestamp...
How severe is CVE-2026-40585?
CVE-2026-40585 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-40585?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.