CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-25198: mailcow: dockerized vulnerable to password reset poisoning

7.1 CVSS

Description

mailcow: dockerized is an open source groupware/email suite based on docker. Prior to version 2025-01a, a vulnerability in mailcow's password reset functionality allows an attacker to manipulate the `Host HTTP` header to generate a password reset link pointing to an attacker-controlled domain. This can lead to account takeover if a user clicks the poisoned link. Version 2025-01a contains a patch. As a workaround, deactivate the password reset functionality by clearing `Notification email sender` and `Notification email subject` under System -> Configuration -> Options -> Password Settings.

Classification

CVE ID: CVE-2025-25198

CVSS Base Severity: HIGH

CVSS Base Score: 7.1

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N

Affected Products

Vendor: mailcow

Product: mailcow-dockerized

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.06% (probability of being exploited)

EPSS Percentile: 28.66% (scored less or equal to compared to others)

EPSS Date: 2025-03-13 (when was this score calculated)

References

https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-3mvx-qw4r-fcqf

Timeline