Masa CMS is an open source Enterprise Content Management platform. Prior to 7.2.8, 7.3.13, and 7.4.6, there is vulnerable to host header poisoning which allows account takeover via password reset email. This vulnerability is fixed in 7.2.8, 7.3.13, and 7.4.6.
Metrics
Affected Vendors & Products
References
History
Fri, 05 Dec 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:masacms:masacms:*:*:*:*:*:*:*:* |
Thu, 04 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Masacms
Masacms masacms |
|
| Vendors & Products |
Masacms
Masacms masacms |
Wed, 03 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 03 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Masa CMS is an open source Enterprise Content Management platform. Prior to 7.2.8, 7.3.13, and 7.4.6, there is vulnerable to host header poisoning which allows account takeover via password reset email. This vulnerability is fixed in 7.2.8, 7.3.13, and 7.4.6. | |
| Title | Host header poisoning allows account takeover via password reset email | |
| Weaknesses | CWE-346 CWE-640 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-12-03T16:37:53.409Z
Updated: 2025-12-03T16:50:44.007Z
Reserved: 2024-04-16T14:15:26.874Z
Link: CVE-2024-32642
Updated: 2025-12-03T16:50:34.121Z
Status : Analyzed
Published: 2025-12-03T17:15:48.543
Modified: 2025-12-05T15:36:02.963
Link: CVE-2024-32642
No data.