CVE-2022-29933: Improper account password reset in Craft CMS
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.84241%
CWE
Published
5/10/2022
Updated
2/1/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| craftcms/cms | composer | < 3.7.36 | 3.7.36 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability occurs in the password reset email generation endpoint (/admin/actions/users/send-password-reset-email). The UsersController's sendPasswordResetEmailAction is responsible for processing reset requests. It improperly trusts the X-Forwarded-Host header when constructing password reset URLs, allowing attackers to poison the link's domain. This matches the described attack vector where header manipulation leads to token leakage. While exact code isn't available, Craft CMS's MVC structure and the documented attack pattern strongly indicate this controller action as the vulnerable component.