Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-61541

Опубликовано: 16 окт. 2025
Источник: debian
EPSS Низкий

Описание

Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
webminremovedpackage

EPSS

Процентиль: 15%
0.00048
Низкий

Связанные уязвимости

CVSS3: 7.1
nvd
3 месяца назад

Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.

CVSS3: 7.1
github
3 месяца назад

Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.

CVSS3: 7.1
fstec
3 месяца назад

Уязвимость функции get_webmin_email_url() панели управления хостингом Webmin, позволяющая нарушителю оказать воздействие на целостность и доступность защищаемой информации

CVSS3: 7.1
redos
2 месяца назад

Уязвимость webmin

EPSS

Процентиль: 15%
0.00048
Низкий