Who Am I: 0xMo7areb โ a bug hunter and Penenteration Tester :)
follow me on: x account || linkedin account
ุงูุญู ุฏ ููู ุงูุฐู ุนููููู ู ุจุงูููู .. ุนููููู ู ุงูุฅูุณุงูู ู ุง ูู ููุนูููู ูุงูุตูุงุฉู ูุงูุณูุงู ู ุนูู ุฎูุฑู ู ูุนููููู ู ุงููุงุณู ุงูุฎูุฑ ู ุญู ุฏ ุฃู ุง ุจุนุฏ

A business logic flaw in the username lifecycle permits the reassignment of email-based usernames after they are changed by the original account owner. Because the platform allows authentication using either email or username โ and initially sets the username equal to the email address โ this creates an identity collision condition.
Summary
When the original user changes their username, their email string becomes available as a username. If another user claims that released identifier, authentication attempts using that email resolve to the new account mapping.
In the observed scenario, this results in permanent account lockout for the legitimate user. While this instance does not enable account takeover, similar implementations in other environments could escalate into full account compromise depending on password reset and verification flows.
This is an availability and identity integrity failure rooted in mutable authentication identifiers.
Platform Behavior
- Users register using their email.
- The email automatically becomes both:
- The account email
- The default username
- Users can authenticate using either their email or username.
- Usernames are mutable and reusable.
This dual-binding model introduces structural risk.
Attack Scenario
- The victim registers and logs in with
Mo7areb@Free.Palestine.com(Email = Username). - The victim later changes their username to:
Mo7areb. - The original email string
Mo7areb@Free.Palestine.combecomes available as a username. - An attacker, knowing only the victim's email address, registers or logs in to their own account.
- The attacker changes their username to:
Mo7areb@Free.Palestine.com. - Authentication requests using that identifier now resolve to the attacker's account.
Result:
- The victim's credentials remain valid.
- The victim can no longer authenticate using their email.
- The login path is effectively hijacked.
- The victim is locked out of their account.
Note โ Potential Admin Escalation Risk
If an administrator uses their email as both email and username (e.g., admin@Free.Palestine) and later changes their username, that original identifier becomes available.
An attacker who knows the admin's email could then register an account and change their username to admin@Free.Palestine.
In this application, this would result in admin account lockout. However, in other implementations where privilege checks, password resets, or role mappings rely on username resolution, this design flaw could potentially escalate to full administrative account takeover.

Root Cause
The system treats a mutable, reusable attribute (username) as an authoritative authentication identifier while simultaneously allowing:
- Username modification
- Username recycling
- Dual login resolution (email or username)
This creates a non-deterministic identity mapping over time.
Authentication should resolve strictly against immutable identifiers such as:
- Internal user ID
- Permanently bound, verified email
Usernames should function only as display aliases.
Impact
- Permanent denial of account access
- Targeted account lockout using publicly known email addresses
- Identity ownership collision
- Increased support and recovery burden
Although no account takeover occurs in this implementation, the architectural weakness introduces elevated risk in environments where password reset or email verification logic is less strict.
This represents a structural identity lifecycle flaw with availability impact and potential escalation pathways.
Triager Answer
he accept it as accepted risk but not eligible bug.

I hope this write-up gives you a clear understanding of how critical and its impactful this flaw truly is.
Don't forget to follow me on this medium account :)
"ุณูุจูุญูุงูููู ุงููููููู ูู ููุจูุญูู ูุฏููู ุ ุฃูุดูููุฏู ุฃููู ูุง ุฅููููู ุฅููุง ุฃูููุชู ุ ุฃูุณูุชูุบูููุฑููู ููุฃูุชููุจู ุฅููููููู"