CVE-2025-43932
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-07-07

Last updated on: 2025-07-08

Assigner: MITRE

Description
JobCenter through 7e7b0b2 allows account takeover via the password reset feature because SERVER_NAME is not configured and thus a reset depends on the Host HTTP header.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-07
Last Modified
2025-07-08
Generated
2026-05-07
AI Q&A
2025-07-07
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-640 The product contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-43932 is a Host Header Injection vulnerability in the JobCenter Flask application caused by the lack of a properly configured SERVER_NAME. This causes the password reset feature to generate reset links based on the incoming Host HTTP header, which can be spoofed by an attacker. By manipulating this header, an attacker can create a malicious password reset link that directs victims to a domain controlled by the attacker, exposing the password reset token and enabling account takeover. [1]


How can this vulnerability impact me? :

This vulnerability can lead to remote account takeover. An attacker can intercept password reset tokens by tricking users into clicking on malicious reset links crafted using a spoofed Host header. Once the attacker obtains the reset token, they can reset the victim's password and gain unauthorized access to their account. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the Flask application's SERVER_NAME configuration is missing or improperly set, causing the app to rely on the Host HTTP header for generating password reset URLs. Additionally, monitoring HTTP requests for unusual or spoofed Host headers during password reset requests may indicate exploitation attempts. Specific commands are not provided in the resources, but inspecting the Flask app configuration files for SERVER_NAME and reviewing logs for suspicious Host headers in password reset requests are recommended. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include configuring the SERVER_NAME parameter in the Flask application's configuration to a fixed, trusted value to prevent reliance on the Host header. Also, sanitize or validate the Host header to prevent spoofing, and remove the _external=True parameter from url_for calls if external URLs are not strictly necessary. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart