Home

Description

Beehive Forum 1.5.2 contains a host header injection vulnerability in the forgot password functionality that allows attackers to manipulate password reset requests. Attackers can inject a malicious host header to intercept password reset tokens and change victim account passwords without direct authentication.

PUBLISHED Reserved 2026-01-11 | Published 2026-01-13 | Updated 2026-02-02 | Assigner VulnCheck




HIGH: 8.5CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Weak Password Recovery Mechanism for Forgotten Password

Product status

1.5.2
affected

Credits

Pablo Santiago finder

References

www.exploit-db.com/exploits/50923 exploit

www.vulncheck.com/advisories/beehive-forum-account-takeover exploit

www.exploit-db.com/exploits/50923 (ExploitDB-50923) exploit

www.beehiveforum.co.uk/ (Beehive Forum Official Website) product

sourceforge.net/projects/beehiveforum/ (Beehive Forum SourceForge Project) product

imgur.com/a/hVlgpCg (Proof of Concept Imgur) exploit

www.vulncheck.com/advisories/beehive-forum-account-takeover (VulnCheck Advisory: Beehive Forum - Account Takeover) third-party-advisory

cve.org (CVE-2022-50910)

nvd.nist.gov (CVE-2022-50910)

Download JSON