Impact
Sub2API, an AI API gateway, has a Host Header and Forwarded Header trust issue that enables password reset poisoning. Attackers can craft a request that injects a malicious domain into the reset link, allowing them to reset one or more user accounts. The vulnerability is classified as CWE‑116 and, if exploited, leads to unauthorized account takeover and potential compromise of all data accessed through the affected accounts.
Affected Systems
The vulnerability affects the Wei‑Shaw sub2api product in all releases before 0.1.85. Organizations running any prior version of the sub2api software should verify their install and ensure an upgrade to v0.1.85 or later.
Risk and Exploitability
The CVSS score of 8 indicates high severity. The EPSS score is below 1%, suggesting that exploitation is considered unlikely but not impossible. The flaw is not listed in CISA’s KEV catalog. An attacker can exploit the vulnerability remotely by sending a crafted HTTP request to the password‑reset endpoint, manipulating the Host or Forwarded headers. The description does not explicitly state whether prior authentication is required to exploit this flaw; based on typical password‑reset flows, it is inferred that the endpoint may be accessed without authentication, but this inference is not guaranteed. If successfully exploited, full takeover of the affected account is possible.
OpenCVE Enrichment