Home

Description

A Host Header Injection vulnerability in the password reset component in axewater sharewarez v2.4.3 allows remote attackers to conduct password reset poisoning and account takeover via manipulation of the Host header when Flask's url_for(_external=True) generates reset links without a fixed SERVER_NAME.

PUBLISHED Reserved 2025-09-26 | Published 2025-10-23 | Updated 2025-10-23 | Assigner mitre

References

portswigger.net/...eader/exploiting/password-reset-poisoning

drive.google.com/...WOLrjKqm96cEPAWp2ph0zJp/view?usp=sharing

github.com/...6f731d1b168d3fb9fdd2df/modules/routes_login.py

github.com/...596f731d1b168d3fb9fdd2df/modules/utils_smtp.py

gist.github.com/...eYangRui/145e529b5fd4f56af299efde37edf4fa

cve.org (CVE-2025-61136)

nvd.nist.gov (CVE-2025-61136)

Download JSON