Drawing-Captcha APP provides interactive, engaging verification for Web-Based Applications. The vulnerability is a Host Header Injection in the /register and /confirm-email endpoints. It allows an attacker to manipulate the Host header in HTTP requests to generate malicious email confirmation links. These links can redirect users to attacker-controlled domains. This vulnerability affects all users relying on email confirmation for account registration or verification. This vulnerability is fixed in 1.2.5-alpha-patch.
CVSS
No CVSS.
References
Configurations
No configuration.
History
17 Oct 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Drawing-Captcha/Drawing-Captcha-APP/issues/30 - |
16 Oct 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-16 19:15
Updated : 2025-10-21 19:31
NVD link : CVE-2025-62428
Mitre link : CVE-2025-62428
CVE.ORG link : CVE-2025-62428
JSON object : View
Products Affected
No product.
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
