CVE-2025-61541

HIGH

Webmin 2.510 - Host Header Injection

Title source: llm

Description

Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.

Scores

CVSS v3 7.1
EPSS 0.0006
EPSS Percentile 17.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H

Details

CWE
CWE-284
Status published
Products (1)
webmin/webmin 2.510
Published Oct 16, 2025
Tracked Since Feb 18, 2026