Description
In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.
References (2)
Core 2
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/debiki/talkyard/commit/4067e191a909ed06f250d09a40e43aa5edbb0289
Third Party Advisory x_refsource_misc
https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25980
Scores
CVSS v3
8.8
EPSS
0.0238
EPSS Percentile
85.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-74
Status
published
Products (1)
talkyard/talkyard
0.04.01 - 0.6.74-wip-63220cb
Published
Nov 11, 2021
Tracked Since
Feb 18, 2026