SB2025123101 - Host header injection in Webmin



SB2025123101 - Host header injection in Webmin

Published: December 31, 2025

Security Bulletin ID SB2025123101
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper Neutralization of HTTP Headers for Scripting Syntax (CVE-ID: CVE-2025-61541)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to improper input validation when processing HTTP requests in the password reset functionality (forgot_send.cgi). A remote non-authenticated attacker can send a specially crafted HTTP request with an arbitrary Host header via get_webmin_email_url() that will be accepted by the application.

Successful exploitation of the vulnerability may allow an attacker to inject a malicious domain into the reset email and trick the victim into clicking on the reset link, intercept the reset token and gain full control of the target account.


Remediation

Install update from vendor's website.