CVE-2024-42914

A host header injection vulnerability exists in the forgot password functionality of ArrowCMS version 1.0.0. By sending a specially crafted host header in the forgot password request, it is possible to send password reset links to users which, once clicked, lead to an attacker-controlled server and thus leak the password reset token. This may allow an attacker to reset other users' passwords.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:arrowjs:arrowcms:1.0.0:*:*:*:*:node.js:*:*

History

21 Apr 2025, 14:40

Type Values Removed Values Added
First Time Arrowjs arrowcms
Arrowjs
References () https://github.com/soursec/CVEs/tree/main/CVE-2024-42914 - () https://github.com/soursec/CVEs/tree/main/CVE-2024-42914 - Exploit, Third Party Advisory
References () https://github.com/trquoccuong/ArrowCMS/ - () https://github.com/trquoccuong/ArrowCMS/ - Product
CPE cpe:2.3:a:arrowjs:arrowcms:1.0.0:*:*:*:*:node.js:*:*

Information

Published : 2024-08-23 19:15

Updated : 2025-04-21 14:40


NVD link : CVE-2024-42914

Mitre link : CVE-2024-42914

CVE.ORG link : CVE-2024-42914


JSON object : View

Products Affected

arrowjs

  • arrowcms
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')