<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ofbiz on Aretiq AI</title><link>https://aretiq.ai/tags/ofbiz/</link><description>Recent content in Ofbiz on Aretiq AI</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 20 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://aretiq.ai/tags/ofbiz/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-45434 — Apache OFBiz LoginWorker checkLogin Password-Change Flow Authentication Bypass RCE</title><link>https://aretiq.ai/research/vul260520-cve-2026-45434-apache-ofbiz-loginworker-checklogin-password-change-flow-authentication-bypass-rce/</link><pubDate>Wed, 20 May 2026 00:00:00 +0000</pubDate><guid>https://aretiq.ai/research/vul260520-cve-2026-45434-apache-ofbiz-loginworker-checklogin-password-change-flow-authentication-bypass-rce/</guid><description>&lt;h2 id="1-overview">1. Overview&lt;/h2>
&lt;p>A vulnerability exists in Apache OFBiz&amp;rsquo;s login authentication workflow that allows an attacker to bypass a forced password-change restriction and achieve remote code execution. When an administrator sets the &lt;code>requirePasswordChange&lt;/code> flag on a user account — for example after a credential leak, during new employee onboarding, or as a default on demo accounts — the account is supposed to be locked out of all functionality until the user changes their password through the dedicated ChangePassword form. However, &lt;code>LoginWorker.checkLogin()&lt;/code> fails to recognize &lt;code>&amp;quot;requirePasswordChange&amp;quot;&lt;/code> as an authentication failure, treating it identically to a successful login. An attacker who knows the current password of a locked account can bypass the restriction by injecting &lt;code>requirePasswordChange=Y&lt;/code> as an HTTP request parameter along with a new password, causing the login and password change to execute inline and granting immediate access to the requested endpoint. Combined with ProgramExport.groovy lacking permission checks and a Groovy sandbox in versions prior to 24.09.06, this enables arbitrary OS command execution in a single HTTP request. Apache addressed this vulnerability in version 24.09.06.&lt;/p></description></item></channel></rss>