CVE-2025-61541
16.10.2025, 15:15
Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.Enginsight
| Vendor | Product | Version |
|---|---|---|
| webmin | webmin | 2.510 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration