Submit #687568: jameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntaxinfo

Titlejameschz Hush 2.0 Improper Neutralization of HTTP Headers for Scripting Syntax
Description$_SERVER['HOST'] is populated from the HTTP Host header submitted by the client. When the application uses this value directly to build absolute URLs, generate links in emails, or reflect it into HTML responses, an attacker can supply an arbitrary Host header and achieve a range of impacts
Source⚠️ https://github.com/lakshayyverma/CVE-Discovery/blob/main/hush.md
User
 lakshay12311 (UID 91298)
Submission11/02/2025 13:19 (6 months ago)
Moderation11/19/2025 17:55 (17 days later)
StatusAccepted
VulDB entry332978 [jameschz Hush Framework 2.0 HTTP Host Header Util.php $_SERVER['HOST'] http headers for scripting syntax]
Points18

Do you need the next level of professionalism?

Upgrade your account now!