{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-32642","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-04-16T14:15:26.874Z","datePublished":"2025-12-03T16:37:53.409Z","dateUpdated":"2025-12-03T16:50:44.007Z"},"containers":{"cna":{"title":"Host header poisoning allows account takeover via password reset email","problemTypes":[{"descriptions":[{"cweId":"CWE-346","lang":"en","description":"CWE-346: Origin Validation Error","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-640","lang":"en","description":"CWE-640: Weak Password Recovery Mechanism for Forgotten Password","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/MasaCMS/MasaCMS/security/advisories/GHSA-qjm6-c8hx-ffh8","tags":["x_refsource_CONFIRM"],"url":"https://github.com/MasaCMS/MasaCMS/security/advisories/GHSA-qjm6-c8hx-ffh8"},{"name":"https://github.com/MasaCMS/MasaCMS/commit/7541b9c99fb9e32d1de6f2658750525cec1d8960","tags":["x_refsource_MISC"],"url":"https://github.com/MasaCMS/MasaCMS/commit/7541b9c99fb9e32d1de6f2658750525cec1d8960"}],"affected":[{"vendor":"MasaCMS","product":"MasaCMS","versions":[{"version":">= 7.4.0, < 7.4.6","status":"affected"},{"version":">= 7.3.0, < 7.3.13","status":"affected"},{"version":"< 7.2.8","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-12-03T16:37:53.409Z"},"descriptions":[{"lang":"en","value":"Masa CMS is an open source Enterprise Content Management platform. Prior to 7.2.8, 7.3.13, and 7.4.6, there is vulnerable to host header poisoning which allows account takeover via password reset email. This vulnerability is fixed in 7.2.8, 7.3.13, and 7.4.6."}],"source":{"advisory":"GHSA-qjm6-c8hx-ffh8","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-03T16:50:28.932386Z","id":"CVE-2024-32642","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-03T16:50:44.007Z"}}]}}