CVE-2025-61541

Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.
Configurations

Configuration 1 (hide)

cpe:2.3:a:webmin:webmin:2.510:*:*:*:*:*:*:*

History

21 Oct 2025, 18:32

Type Values Removed Values Added
First Time Webmin webmin
Webmin
CPE cpe:2.3:a:webmin:webmin:2.510:*:*:*:*:*:*:*
References () http://www.webmin.com/ - () http://www.webmin.com/ - Product
References () https://github.com/bugdotexe/Vulnerability-Research/tree/main/CVE-2025-61541 - () https://github.com/bugdotexe/Vulnerability-Research/tree/main/CVE-2025-61541 - Exploit, Third Party Advisory
References () https://github.com/webmin/webmin - () https://github.com/webmin/webmin - Product

16 Oct 2025, 19:15

Type Values Removed Values Added
CWE CWE-284
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.1

16 Oct 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-16 15:15

Updated : 2025-10-21 18:32


NVD link : CVE-2025-61541

Mitre link : CVE-2025-61541

CVE.ORG link : CVE-2025-61541


JSON object : View

Products Affected

webmin

  • webmin
CWE
CWE-284

Improper Access Control