CVE-2025-25198

HIGH

mailcow: dockerized <2025-01a - Info Disclosure

Title source: llm

Description

mailcow: dockerized is an open source groupware/email suite based on docker. Prior to version 2025-01a, a vulnerability in mailcow's password reset functionality allows an attacker to manipulate the `Host HTTP` header to generate a password reset link pointing to an attacker-controlled domain. This can lead to account takeover if a user clicks the poisoned link. Version 2025-01a contains a patch. As a workaround, deactivate the password reset functionality by clearing `Notification email sender` and `Notification email subject` under System -> Configuration -> Options -> Password Settings.

Exploits (3)

github WORKING POC 17 stars
by Groppoxx · pythonpoc
https://github.com/Groppoxx/CVE-2025-25198-PoC
github WORKING POC 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-25198
github WORKING POC
by enzocipher · gopoc
https://github.com/enzocipher/CVE-2025-25198

Scores

CVSS v3 7.1
EPSS 0.0581
EPSS Percentile 90.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N

Details

CWE
CWE-601
Status published
Products (1)
mailcow/mailcow\ < 2025-01a
Published Feb 12, 2025
Tracked Since Feb 18, 2026