The password reset component deployed within Umbraco uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to Umbraco users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. A related vulnerability (CVE-2022-22690) could allow this flaw to become persistent so that all password reset URLs are affected persistently following a successful attack. See the AppCheck advisory for further information and associated caveats.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-0686 The password reset component deployed within Umbraco uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to Umbraco users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is followed. A related vulnerability (CVE-2022-22690) could allow this flaw to become persistent so that all password reset URLs are affected persistently following a successful attack. See the AppCheck advisory for further information and associated caveats.
Github GHSA Github GHSA GHSA-r8pr-83cc-ccv7 Umbraco Persistent Password Reset Poison
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00329}

epss

{'score': 0.00347}


cve-icon MITRE

Status: PUBLISHED

Assigner: AppCheck

Published:

Updated: 2024-09-16T23:46:59.483Z

Reserved: 2022-01-05T00:00:00

Link: CVE-2022-22691

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-18T17:15:10.827

Modified: 2024-11-21T06:47:16.643

Link: CVE-2022-22691

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.