Cyber Posture

CVE-2025-25198

High

Published: 12 February 2025

Published
12 February 2025
Modified
01 October 2025
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N
EPSS Score 0.0581 90.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.

Security Summary

CVE-2025-25198 is a vulnerability in mailcow: dockerized, an open source groupware and email suite based on Docker, affecting versions prior to 2025-01a. It exists in the password reset functionality, where an attacker can manipulate the Host HTTP header to generate a password reset link pointing to an attacker-controlled domain. Classified as CWE-601 (URL Redirection to Untrusted Site), it carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N).

The attack requires no privileges and can be launched remotely over the network with low complexity, though it depends on user interaction. An unauthenticated attacker tricks a user into initiating a password reset, intercepts or crafts the request to alter the Host header, and delivers an email with a poisoned link. If the user clicks the link, the attacker achieves account takeover, enabling high integrity impact such as unauthorized access and control over the victim's email account.

The GitHub security advisory (GHSA-3mvx-qw4r-fcqf) confirms that version 2025-01a contains a patch. As a workaround, deactivate password reset by clearing the "Notification email sender" and "Notification email subject" fields under System -> Configuration -> Options -> Password Settings.

Details

CWE(s)
CWE-601

Affected Products

mailcow
mailcow\
_dockerized

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

The vulnerability in the public-facing mailcow application (password reset Host header manipulation) directly enables exploitation of the app for account takeover via poisoned reset links, mapping to T1190 and subsequent use of valid accounts (T1078).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References