Description
A host header injection vulnerability exists in the forgot password functionality of ArrowCMS version 1.0.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://github.com/soursec/CVEs/tree/main/CVE-2024-42914
Scores
CVSS v3
9.1
EPSS
0.0020
EPSS Percentile
42.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-74
Status
published
Products (1)
arrowjs/arrowcms
1.0.0
Published
Aug 23, 2024
Tracked Since
Feb 18, 2026