Passbolt API before 5, if the server is misconfigured (with an incorrect installation process and disregarding of Health Check results), can send email messages with a domain name taken from an attacker-controlled HTTP Host header.
History

Tue, 11 Mar 2025 03:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 10 Mar 2025 20:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-348
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N'}


Mon, 10 Mar 2025 20:15:00 +0000

Type Values Removed Values Added
Description Passbolt API before 5, if the server is misconfigured (with an incorrect installation process and disregarding of Health Check results), can send email messages with a domain name taken from an attacker-controlled HTTP Host header.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-03-11T02:52:25.597Z

Reserved: 2025-03-10T00:00:00.000Z

Link: CVE-2025-27913

cve-icon Vulnrichment

Updated: 2025-03-11T02:52:21.156Z

cve-icon NVD

Status : Received

Published: 2025-03-10T20:15:14.500

Modified: 2025-03-11T03:15:40.027

Link: CVE-2025-27913

cve-icon Redhat

No data.