Home

Description

mailcow: dockerized is an open source groupware/email suite based on docker. Prior to version 2025-01a, a vulnerability in mailcow's password reset functionality allows an attacker to manipulate the `Host HTTP` header to generate a password reset link pointing to an attacker-controlled domain. This can lead to account takeover if a user clicks the poisoned link. Version 2025-01a contains a patch. As a workaround, deactivate the password reset functionality by clearing `Notification email sender` and `Notification email subject` under System -> Configuration -> Options -> Password Settings.

PUBLISHED Reserved 2025-02-03 | Published 2025-02-12 | Updated 2025-02-12 | Assigner GitHub_M




HIGH: 7.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N

Problem types

CWE-601: URL Redirection to Untrusted Site ('Open Redirect')

Product status

< 2025-01a
affected

References

github.com/...erized/security/advisories/GHSA-3mvx-qw4r-fcqf

cve.org (CVE-2025-25198)

nvd.nist.gov (CVE-2025-25198)

Download JSON