Drawing-Captcha APP provides interactive, engaging verification for Web-Based Applications. The vulnerability is a Host Header Injection in the /register and /confirm-email endpoints. It allows an attacker to manipulate the Host header in HTTP requests to generate malicious email confirmation links. These links can redirect users to attacker-controlled domains. This vulnerability affects all users relying on email confirmation for account registration or verification. This vulnerability is fixed in 1.2.5-alpha-patch.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Drawing-captcha
Drawing-captcha drawing-captcha |
|
| Vendors & Products |
Drawing-captcha
Drawing-captcha drawing-captcha |
Fri, 17 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Oct 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Drawing-Captcha APP provides interactive, engaging verification for Web-Based Applications. The vulnerability is a Host Header Injection in the /register and /confirm-email endpoints. It allows an attacker to manipulate the Host header in HTTP requests to generate malicious email confirmation links. These links can redirect users to attacker-controlled domains. This vulnerability affects all users relying on email confirmation for account registration or verification. This vulnerability is fixed in 1.2.5-alpha-patch. | |
| Title | Drawing-Captcha APP Host Header Injection in `/register` and `/confirm-email` Endpoints | |
| Weaknesses | CWE-601 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-16T18:57:14.114Z
Updated: 2025-10-17T14:28:00.593Z
Reserved: 2025-10-13T16:26:12.180Z
Link: CVE-2025-62428
Updated: 2025-10-17T14:27:49.830Z
Status : Awaiting Analysis
Published: 2025-10-16T19:15:35.450
Modified: 2025-10-21T19:31:50.020
Link: CVE-2025-62428
No data.