Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.
History

Thu, 16 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 16 Oct 2025 15:00:00 +0000

Type Values Removed Values Added
Description Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-16T19:02:13.916Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-61541

cve-icon Vulnrichment

Updated: 2025-10-16T19:02:09.601Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-16T15:15:34.713

Modified: 2025-10-16T19:15:33.633

Link: CVE-2025-61541

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.