Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,19 +1,62 @@
{
"schema_version": "1.4.0",
"id": "GHSA-7gm6-w7mx-58cr",
"modified": "2026-05-04T21:30:24Z",
"modified": "2026-05-04T21:31:28Z",
"published": "2026-05-04T09:31:09Z",
"aliases": [
"CVE-2026-29199"
],
"summary": "Password Reset Link Poisoning via Host Header injection",
"details": "phpBB before 3.3.16 is vulnerable to Host Header Injection that can lead to password rest link poisoning. When force_server_vars is disabled, the servers hostname may be extracted from the HTTP Host header which is used to generate the password reset link URL. An attacker who can manipulate the Host header (e.g. through misconfigured host setup or missing header validation by the webserver) can cause password reset emails to contain a link pointing to an attacker-controlled domain, potentially leading to account takeover.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"
}
],
"affected": [],
"affected": [
{
"package": {
"ecosystem": "Packagist",
"name": "phpbb/phpbb"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "3.0.0"
},
{
"fixed": "3.3.16"
}
]
}
]
},
{
"package": {
"ecosystem": "Packagist",
"name": "phpbb/phpbb"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "4.0.0-a1"
},
{
"fixed": "4.0.0-a2"
}
]
}
],
"versions": [
"4.0.0-a1"
]
}
],
"references": [
{
"type": "ADVISORY",
Expand Down
Loading