Home

Description

Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.

PUBLISHED Reserved 2025-09-26 | Published 2025-10-16 | Updated 2025-10-16 | Assigner mitre

References

github.com/webmin/webmin

www.webmin.com/

github.com/...ulnerability-Research/tree/main/CVE-2025-61541

cve.org (CVE-2025-61541)

nvd.nist.gov (CVE-2025-61541)

Download JSON