CVE-2022-38796
Description
A Host Header Injection vulnerability in Feehi CMS 2.1.1 may allow an attacker to spoof a particular header. This can be exploited by abusing password reset emails.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Feehi CMS 2.1.1 is vulnerable to Host Header Injection, which can be abused to spoof password reset emails.
Vulnerability
Overview
Feehi CMS 2.1.1 suffers from a Host Header Injection vulnerability. The application does not properly validate or sanitize the HTTP Host header, allowing an attacker to inject arbitrary values via the Host header [1]. This root cause lies in insufficient input validation when constructing URLs or links within the application.
Exploitation
Scenario
An attacker can exploit this vulnerability by intercepting or crafting a request to the Feehi CMS application that includes a malicious Host header. When the application triggers a password reset, it uses the attacker-controlled Host header to generate the reset link. No authentication is required to initiate the password reset process, making the attack surface accessible to unauthenticated remote attackers who can trick a user into clicking a crafted link [1][2].
Impact
Successful exploitation allows an attacker to spoof the Host header, leading to a password reset email being sent to the victim with a malicious link that directs to an attacker-controlled domain. This can result in account takeover if the victim follows the link and submits the reset form [1]. The attacker could also potentially redirect users to phishing pages designed to harvest credentials.
Mitigation
Status
As of the publication date (2022-09-14), no official patch or updated version had been released by the vendor based on the available references [1][2]. Users are advised to apply strict input validation on the Host header or use a reverse proxy to enforce a whitelist of allowed hostnames until a patch is available.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
feehi/cmsPackagist | <= 2.1.1 | — |
Affected products
2- Feehi/CMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-4r4f-jrvw-h727ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-38796ghsaADVISORY
- www.youtube.com/watchghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.