CVE-2022-22691
C# vulnerability analysis and mitigation

Overview

CVE-2022-22691 is a security vulnerability in the password reset component of Umbraco CMS, discovered and disclosed on January 18, 2022. The vulnerability affects Umbraco versions prior to 9.2.0 and involves the manipulation of the hostname in the request host header when building password reset URLs. This vulnerability is closely related to CVE-2022-22690, which can make the vulnerability's effects persistent (AppCheck Advisory).

Technical details

The vulnerability exists in the password reset component where the system uses the hostname supplied within the request host header to build password reset URLs. When exploited, an attacker can manipulate the URL sent to Umbraco users to point to their malicious server. The vulnerability has been assigned a CVSS v3.1 base score of 7.4 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N, indicating a high-severity issue with network access vector and user interaction required (NVD).

Impact

If successfully exploited, the vulnerability allows attackers to intercept password reset tokens when users follow manipulated password reset links. This can lead to unauthorized access to user accounts and potential account takeover. The impact is particularly severe when combined with CVE-2022-22690, as it allows the attack to become persistent, affecting all password reset URLs generated by the system (AppCheck Advisory).

Mitigation and workarounds

A partial fix was implemented in Umbraco version 9.2.0, where password reset and user invites no longer use the cached ApplicationUrl. For complete mitigation, administrators should specifically set the UmbracoApplicationUrl within the Umbraco Configuration or specify a specific hostname within the IIS bindings. These measures prevent the vulnerability from being exploited (AppCheck Advisory).

Additional resources


SourceThis report was generated using AI

Related C# vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-64095CRITICAL9.8
  • C#C#
  • cpe:2.3:a:dotnetnuke:dotnetnuke
NoYesOct 28, 2025
CVE-2025-64113CRITICAL9.3
  • C#C#
  • MediaBrowser.Server.Core
NoYesDec 08, 2025
CVE-2025-66631HIGH7.2
  • C#C#
  • Csla
NoYesDec 09, 2025
CVE-2025-66625MEDIUM4.9
  • C#C#
  • Umbraco.Cms
NoYesDec 09, 2025
CVE-2025-65955MEDIUM4.9
  • C#C#
  • Magick.NET-Q16-HDRI-arm64
NoYesDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management