Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.
Metrics
Affected Vendors & Products
References
History
Tue, 21 Oct 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:webmin:webmin:2.510:*:*:*:*:*:*:* |
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webmin
Webmin webmin |
|
| Vendors & Products |
Webmin
Webmin webmin |
Thu, 16 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Thu, 16 Oct 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-10-16T00:00:00.000Z
Updated: 2025-10-16T19:02:13.916Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61541
Updated: 2025-10-16T19:02:09.601Z
Status : Undergoing Analysis
Published: 2025-10-16T15:15:34.713
Modified: 2025-10-21T18:32:03.970
Link: CVE-2025-61541
No data.