Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 21 Oct 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:webmin:webmin:2.510:*:*:*:*:*:*:* |
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webmin
Webmin webmin |
|
| Vendors & Products |
Webmin
Webmin webmin |
Thu, 16 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Thu, 16 Oct 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-16T19:02:13.916Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61541
Updated: 2025-10-16T19:02:09.601Z
Status : Analyzed
Published: 2025-10-16T15:15:34.713
Modified: 2025-11-06T22:20:36.107
Link: CVE-2025-61541
No data.
OpenCVE Enrichment
Updated: 2025-10-20T13:25:15Z