Drawing-Captcha APP provides interactive, engaging verification for Web-Based Applications. The vulnerability is a Host Header Injection in the /register and /confirm-email endpoints. It allows an attacker to manipulate the Host header in HTTP requests to generate malicious email confirmation links. These links can redirect users to attacker-controlled domains. This vulnerability affects all users relying on email confirmation for account registration or verification. This vulnerability is fixed in 1.2.5-alpha-patch.
Metrics
Affected Vendors & Products
References
History
Fri, 17 Oct 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 16 Oct 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Drawing-Captcha APP provides interactive, engaging verification for Web-Based Applications. The vulnerability is a Host Header Injection in the /register and /confirm-email endpoints. It allows an attacker to manipulate the Host header in HTTP requests to generate malicious email confirmation links. These links can redirect users to attacker-controlled domains. This vulnerability affects all users relying on email confirmation for account registration or verification. This vulnerability is fixed in 1.2.5-alpha-patch. | |
Title | Drawing-Captcha APP Host Header Injection in `/register` and `/confirm-email` Endpoints | |
Weaknesses | CWE-601 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-17T14:28:00.593Z
Reserved: 2025-10-13T16:26:12.180Z
Link: CVE-2025-62428

Updated: 2025-10-17T14:27:49.830Z

Status : Received
Published: 2025-10-16T19:15:35.450
Modified: 2025-10-17T15:15:40.267
Link: CVE-2025-62428

No data.

No data.