Webmin 2.510 is vulnerable to a Host Header Injection in the password reset functionality (forgot_send.cgi). The reset link sent to users is constructed using the HTTP Host header via get_webmin_email_url(). An attacker can manipulate the Host header to inject a malicious domain into the reset email. If a victim follows the poisoned link, the attacker can intercept the reset token and gain full control of the target account.
References
| Link | Resource |
|---|---|
| http://www.webmin.com/ | Release Notes |
| https://github.com/bugdotexe/Vulnerability-Research/tree/main/CVE-2025-61541 | Exploit Third Party Advisory |
| https://github.com/webmin/webmin | Product |
Configurations
History
06 Nov 2025, 22:20
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.webmin.com/ - Release Notes |
Information
Published : 2025-10-16 15:15
Updated : 2025-11-06 22:20
NVD link : CVE-2025-61541
Mitre link : CVE-2025-61541
CVE.ORG link : CVE-2025-61541
JSON object : View
Products Affected
webmin
- webmin
CWE
CWE-284
Improper Access Control
