In Talkyard, versions v0.04.01 through v0.6.74-WIP-63220cb, v0.2020.22-WIP-b2e97fe0e through v0.2021.02-WIP-879ef3fe1 and tyse-v0.2021.02-879ef3fe1-regular through tyse-v0.2021.28-af66b6905-regular, are vulnerable to Host Header Injection. By luring a victim application-user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.
History

Wed, 30 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Mend

Published: 2021-11-11T07:10:11.000Z

Updated: 2025-04-30T15:46:56.474Z

Reserved: 2021-01-22T00:00:00.000Z

Link: CVE-2021-25980

cve-icon Vulnrichment

Updated: 2024-08-03T20:19:18.988Z

cve-icon NVD

Status : Modified

Published: 2021-11-11T07:15:11.380

Modified: 2024-11-21T05:55:43.480

Link: CVE-2021-25980

cve-icon Redhat

No data.