Cyber Posture

CVE-2022-50910

CriticalPublic PoC

Published: 13 January 2026

Published
13 January 2026
Modified
02 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0048 65.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Beehive Forum 1.5.2 contains a host header injection vulnerability in the forgot password functionality that allows attackers to manipulate password reset requests. Attackers can inject a malicious host header to intercept password reset tokens and change victim account passwords without…

more

direct authentication.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of untrusted inputs like the malicious Host header in forgot password requests to prevent injection and URL manipulation.

prevent

Mandates secure management of authenticators including password reset tokens to mitigate interception and unauthorized use via manipulated reset links.

preventdetect

Enforces boundary protection mechanisms such as web application firewalls to filter or block requests exploiting Host header injection in public-facing password reset functionality.

Security SummaryAI

CVE-2022-50910 is a host header injection vulnerability in Beehive Forum version 1.5.2, specifically within the forgot password functionality. This issue, classified under CWE-640, enables attackers to manipulate password reset requests by injecting a malicious host header, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Remote attackers require no privileges, authentication, or user interaction to exploit this vulnerability over the network. By injecting a malicious host header, they can intercept password reset tokens sent to victims, allowing unauthorized password changes and full account takeover without direct authentication.

Advisories and references, including a Vulncheck advisory on Beehive Forum account takeover and an Exploit-DB entry (50923) with a public exploit, highlight the issue. The Beehive Forum project page on SourceForge and official website provide additional context, along with an Imgur-hosted proof-of-concept image. No specific patch or mitigation details are detailed in the provided information.

Details

CWE(s)

Affected Products

beehiveforum
beehive forum
1.5.2

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a host header injection in a public-facing web application (Beehive Forum), enabling remote, unauthenticated account takeover via password reset token interception without user interaction.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References