Количество 5
Количество 5
CVE-2025-61541
Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.
CVE-2025-61541
Webmin 2.510 is vulnerable to a Host Header Injection in the password ...
GHSA-j92g-3wfv-qp43
Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.
BDU:2025-14429
Уязвимость функции get_webmin_email_url() панели управления хостингом Webmin, позволяющая нарушителю оказать воздействие на целостность и доступность защищаемой информации
ROS-20251113-02
Уязвимость webmin
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-61541 Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account. | CVSS3: 7.1 | 0% Низкий | 3 месяца назад | |
CVE-2025-61541 Webmin 2.510 is vulnerable to a Host Header Injection in the password ... | CVSS3: 7.1 | 0% Низкий | 3 месяца назад | |
GHSA-j92g-3wfv-qp43 Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account. | CVSS3: 7.1 | 0% Низкий | 3 месяца назад | |
BDU:2025-14429 Уязвимость функции get_webmin_email_url() панели управления хостингом Webmin, позволяющая нарушителю оказать воздействие на целостность и доступность защищаемой информации | CVSS3: 7.1 | 0% Низкий | 3 месяца назад | |
ROS-20251113-02 Уязвимость webmin | CVSS3: 7.1 | 0% Низкий | 2 месяца назад |
Уязвимостей на страницу