Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Password Reset Poisoning Attack Allows Account Takeover Using the Password Reset Link

Posted on June 19, 2025June 19, 2025 By CWS

A essential vulnerability in password reset mechanisms has been found that enables attackers to fully take over person accounts by manipulating password reset hyperlinks.

Safety researcher Pratik Dabhi not too long ago disclosed particulars of a Host Header Injection assault that exploits how internet purposes assemble password reset URLs, doubtlessly affecting tens of millions of customers throughout varied platforms.

Password Reset Poisoning Vulnerability

Password Reset Poisoning happens when internet purposes improperly depend on user-supplied HTTP headers to assemble password reset hyperlinks. 

When customers request a password reset, purposes sometimes ship an electronic mail containing a novel token-based URL comparable to

Nevertheless, if the appliance makes use of the Host header from the HTTP request to construct this URL with out correct validation, attackers can manipulate the vacation spot area.

The vulnerability was found throughout reconnaissance testing on an account subdomain at The researcher captured the next HTTP request utilizing Burp Suite:

By modifying the Host header to Host: bing.com and resending the request, the password reset electronic mail contained a malicious hyperlink pointing to as an alternative of the respectable area.

The assault course of entails intercepting the password reset request and changing the Host header with an attacker-controlled area. 

When the sufferer receives the password reset electronic mail and clicks the hyperlink, their reset token is distributed to the attacker’s server as an alternative of the respectable utility. 

This permits the attacker to make use of the legitimate token on the true web site to reset the sufferer’s password and acquire full account entry.

The exploitation requires minimal technical sophistication, utilizing commonplace penetration testing instruments like Burp Suite to change HTTP headers.

The assault could be automated and scaled to focus on a number of customers concurrently, making it notably harmful for purposes with giant person bases.

Mitigation Methods

In accordance with the report, the safety implications are extreme, enabling full account takeover with entry to delicate private data, monetary knowledge, and confidential enterprise data. 

Past particular person account compromise, organizations face vital reputational harm and potential regulatory compliance violations.

Efficient mitigation requires implementing server-side area validation utilizing trusted configuration variables like SERVER_NAME as an alternative of counting on user-supplied Host headers. 

Purposes ought to keep allowlists of respectable domains and reject requests containing unauthorized hosts. Common safety audits, penetration testing, and code evaluations can establish related vulnerabilities earlier than exploitation happens.

This discovery highlights the essential significance of validating all person inputs, together with HTTP headers that builders would possibly overlook throughout safety assessments.

Meet the cyber warriors Who Stopped the WannaCry Ransomware assault => Free Dwell Webinar

Cyber Security News Tags:Account, Attack, Link, Password, Poisoning, Reset, Takeover

Post navigation

Previous Post: Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign
Next Post: High-Severity Vulnerabilities Patched by Cisco, Atlassian

Related Posts

New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment Cyber Security News
Windows BitLocker Vulnerability Let Attackers Elevate Privileges Cyber Security News
UNG0002 Actors Deploys Weaponize LNK Files Using ClickFix Fake CAPTCHA Verification Pages Cyber Security News
Behavioral Analysis for Detecting APT Intrusions in Real Time Cyber Security News
Threat Actors Combine Android Malware With Click Fraud Apps to Steal Login Credentials Cyber Security News
Apple Warns Of Series Mercenary Spyware Attacks Targeting Users Devices Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic
  • Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched
  • Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews
  • Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic
  • Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched
  • Google Maps Adds Feature for Businesses to Report Ransom Demands for Removing Bad Reviews
  • Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
  • Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News