Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Password Reset Poisoning Attack Allows Account Takeover Using the Password Reset Link

Posted on June 19, 2025June 19, 2025 By CWS

A essential vulnerability in password reset mechanisms has been found that enables attackers to fully take over person accounts by manipulating password reset hyperlinks.

Safety researcher Pratik Dabhi not too long ago disclosed particulars of a Host Header Injection assault that exploits how internet purposes assemble password reset URLs, doubtlessly affecting tens of millions of customers throughout varied platforms.

Password Reset Poisoning Vulnerability

Password Reset Poisoning happens when internet purposes improperly depend on user-supplied HTTP headers to assemble password reset hyperlinks. 

When customers request a password reset, purposes sometimes ship an electronic mail containing a novel token-based URL comparable to

Nevertheless, if the appliance makes use of the Host header from the HTTP request to construct this URL with out correct validation, attackers can manipulate the vacation spot area.

The vulnerability was found throughout reconnaissance testing on an account subdomain at The researcher captured the next HTTP request utilizing Burp Suite:

By modifying the Host header to Host: bing.com and resending the request, the password reset electronic mail contained a malicious hyperlink pointing to as an alternative of the respectable area.

The assault course of entails intercepting the password reset request and changing the Host header with an attacker-controlled area. 

When the sufferer receives the password reset electronic mail and clicks the hyperlink, their reset token is distributed to the attacker’s server as an alternative of the respectable utility. 

This permits the attacker to make use of the legitimate token on the true web site to reset the sufferer’s password and acquire full account entry.

The exploitation requires minimal technical sophistication, utilizing commonplace penetration testing instruments like Burp Suite to change HTTP headers.

The assault could be automated and scaled to focus on a number of customers concurrently, making it notably harmful for purposes with giant person bases.

Mitigation Methods

In accordance with the report, the safety implications are extreme, enabling full account takeover with entry to delicate private data, monetary knowledge, and confidential enterprise data. 

Past particular person account compromise, organizations face vital reputational harm and potential regulatory compliance violations.

Efficient mitigation requires implementing server-side area validation utilizing trusted configuration variables like SERVER_NAME as an alternative of counting on user-supplied Host headers. 

Purposes ought to keep allowlists of respectable domains and reject requests containing unauthorized hosts. Common safety audits, penetration testing, and code evaluations can establish related vulnerabilities earlier than exploitation happens.

This discovery highlights the essential significance of validating all person inputs, together with HTTP headers that builders would possibly overlook throughout safety assessments.

Meet the cyber warriors Who Stopped the WannaCry Ransomware assault => Free Dwell Webinar

Cyber Security News Tags:Account, Attack, Link, Password, Poisoning, Reset, Takeover

Post navigation

Previous Post: Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign
Next Post: High-Severity Vulnerabilities Patched by Cisco, Atlassian

Related Posts

Top 10 Advanced Threat Detection Techniques for Modern Cybersecurity Cyber Security News
Weaponized PyPI Package Steals Solana Private Keys Via Supply Chain Attack Cyber Security News
Mastering Intrusion Detection Systems – A Technical Guide Cyber Security News
New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis Cyber Security News
Predictive Cyber Risk Analysis Using Aggregated Threat Intelligence Cyber Security News
Threat Actors Using ViperSoftX Malware to Exfiltrate Sensitive Details Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Campaigns Distribute Malware via Open Source Hacking Tools
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Chain IQ, UBS Data Stolen in Ransomware Attack
  • Encryption Backdoors: The Security Practitioners’ View

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New Campaigns Distribute Malware via Open Source Hacking Tools
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Chain IQ, UBS Data Stolen in Ransomware Attack
  • Encryption Backdoors: The Security Practitioners’ View

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News