### [CVE-2021-25994](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25994) ![](https://img.shields.io/static/v1?label=Product&message=userfrosting&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0.3.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20('Injection')&color=brightgreen) ### Description In Userfrosting, versions v0.3.1 to v4.6.2 are vulnerable to Host Header Injection. By luring a victim application user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account. ### POC #### Reference - https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25994 #### Github No PoCs found on GitHub currently.