Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61543: n/a

0
High
VulnerabilityCVE-2025-61543cvecve-2025-61543
Published: Thu Oct 16 2025 (10/16/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-61543 is a Host Header Injection vulnerability in CraftMyCMS version 4. 0. 2. 2 affecting its password reset functionality. The application uses the HTTP Host header directly to generate password reset links sent via email, allowing attackers to manipulate the Host header and craft malicious reset URLs. This can lead to phishing attacks or account takeover by tricking users into clicking attacker-controlled links. No known exploits are currently reported in the wild. The vulnerability does not require user authentication but does require the attacker to intercept or influence HTTP requests to the vulnerable server. European organizations using CraftMyCMS 4. 0.

AI-Powered Analysis

AILast updated: 10/16/2025, 15:14:02 UTC

Technical Analysis

CVE-2025-61543 is a Host Header Injection vulnerability identified in CraftMyCMS version 4.0.2.2, specifically within its password reset functionality. The vulnerability arises because the application directly uses the HTTP Host header ($_SERVER['HTTP_HOST']) to construct password reset URLs sent to users via email. Since the Host header is user-controllable in HTTP requests, an attacker can manipulate this header to inject arbitrary hostnames or domains into the reset link. This manipulation enables attackers to craft malicious password reset emails containing links that direct victims to attacker-controlled domains. Consequently, this can facilitate phishing attacks where users are tricked into divulging credentials or performing unauthorized password resets, potentially leading to account takeover. The vulnerability does not require authentication, and exploitation only requires the ability to send crafted HTTP requests to the vulnerable server. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The lack of input validation or sanitization of the Host header is the root cause. This vulnerability highlights the risk of trusting user-controllable HTTP headers when generating security-sensitive links. Remediation involves validating the Host header against a whitelist or hardcoding the domain used in password reset links to prevent injection of malicious hosts. Organizations should monitor for updates or patches from CraftMyCMS and apply them promptly once available.

Potential Impact

For European organizations using CraftMyCMS 4.0.2.2, this vulnerability poses a significant risk to user account security and organizational reputation. Successful exploitation can lead to phishing campaigns leveraging legitimate password reset emails with attacker-controlled links, increasing the likelihood of credential theft. Account takeover risks can result in unauthorized access to sensitive data, disruption of services, and potential lateral movement within networks. The phishing aspect can also damage trust in the organization's communications and brand. Since password reset functionality is commonly used, the attack surface is broad. The vulnerability could be exploited by remote attackers without authentication, increasing the threat level. Organizations with large user bases or handling sensitive information are particularly vulnerable. Additionally, regulatory compliance risks exist if compromised accounts lead to data breaches under GDPR. The absence of known exploits currently provides a window for proactive mitigation, but the ease of exploitation suggests attackers may develop exploits soon.

Mitigation Recommendations

1. Implement strict validation of the Host header by comparing it against a whitelist of allowed domains or by hardcoding the domain used in password reset URLs, avoiding reliance on user-controllable headers. 2. Modify the password reset functionality to construct URLs using a trusted configuration value rather than $_SERVER['HTTP_HOST']. 3. Monitor and apply official patches or updates from CraftMyCMS as soon as they are released addressing this vulnerability. 4. Employ email security measures such as DMARC, DKIM, and SPF to reduce the effectiveness of phishing emails. 5. Educate users to verify URLs in password reset emails and report suspicious links. 6. Implement multi-factor authentication (MFA) to reduce the impact of credential compromise. 7. Conduct regular security assessments and penetration testing focusing on HTTP header injection and related vulnerabilities. 8. Monitor logs for unusual password reset requests or anomalies in Host headers to detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f108349f8a5dbaeadb9488

Added to database: 10/16/2025, 2:59:00 PM

Last enriched: 10/16/2025, 3:14:02 PM

Last updated: 10/16/2025, 4:53:00 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats