VYPR
Moderate severityNVD Advisory· Published Nov 18, 2025· Updated Nov 19, 2025

CVE-2025-63828

CVE-2025-63828

Description

Host Header Injection vulnerability in Backdrop CMS 1.32.1 allows attackers to manipulate the Host header in password reset requests, leading to redirects to malicious domains and potential session hijacking via cookie injection.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Backdrop CMS 1.32.1 is vulnerable to Host Header Injection in password reset requests, enabling redirects to malicious domains and potential session hijacking.

Vulnerability

Description

The vulnerability is a Host Header Injection in Backdrop CMS version 1.32.1, specifically within the password reset functionality. The application fails to validate or sanitize the Host header provided in HTTP requests, allowing an attacker to inject arbitrary values [1]. This flaw originates from the lack of strict checking of the Host header when generating password reset links [2].

Exploitation

To exploit this vulnerability, an attacker can craft a password reset request with a manipulated Host header pointing to a malicious domain. When a user clicks the password reset link in the email, the user's browser may be redirected to the attacker-controlled domain. The attack requires no authentication and can be performed remotely over the network. Proof-of-concept code is publicly available [3].

Impact

Successful exploitation can lead to redirecting users to malicious websites, potentially resulting in credential theft or malware installation. Additionally, the attacker may inject cookies into the legitimate site's session, leading to session hijacking [1]. This can compromise user accounts and sensitive data.

Mitigation

As of the publication date, no official patch has been released for this vulnerability. Users are advised to implement workarounds such as configuring web server rules to validate the Host header or using a reverse proxy. The vendor has been notified through security channels [2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
backdrop/backdropPackagist
<= 1.32.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.