Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Craftcms
Craftcms craft Cms |
|
| Vendors & Products |
Craftcms
Craftcms craft Cms |
Thu, 16 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Thu, 16 Oct 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Host Header Injection vulnerability exists in the password reset functionality of CraftMyCMS 4.0.2.2. The system uses `$_SERVER['HTTP_HOST']` directly to construct password reset links sent via email. An attacker can manipulate the Host header to send malicious reset links, enabling phishing attacks or account takeover. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-16T19:03:20.605Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61543
Updated: 2025-10-16T19:03:16.383Z
Status : Deferred
Published: 2025-10-16T15:15:34.847
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-61543
No data.
OpenCVE Enrichment
Updated: 2025-10-21T09:40:42Z