CVE-2022-29933
PHP vulnerability analysis and mitigation

Overview

Craft CMS through version 3.7.36 contains a password reset poisoning vulnerability (CVE-2022-29933) that allows remote unauthenticated attackers to take over user accounts. The vulnerability requires the attacker to know at least one valid username and can be exploited by manipulating the X-Forwarded-Host HTTP header during the password reset process (SEC Consult Advisory, NVD).

Technical details

The vulnerability exists in the password reset functionality accessible via /index.php?p=admin/actions/users/send-password-reset-email. An attacker can intercept the password reset request and add a malicious X-Forwarded-Host header pointing to an attacker-controlled server. When a user clicks the reset link in the email, the password reset tokens are sent to the attacker's server, allowing them to construct a valid password reset URL and take over the account. The vulnerability has a CVSS v3.1 Base Score of 8.8 HIGH (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) (NVD).

Impact

A successful exploit allows an attacker to reset passwords and take over any user account for which they know the username. This gives them full access to the compromised account's permissions and functionality within the CMS (SEC Consult Advisory).

Mitigation and workarounds

The vendor's position is that customers can mitigate this by adjusting the configuration rather than using the default settings. The backend login interface and password reset function should not be accessible from the internet or unknown IP addresses. Users must implement the workaround described in the vendor's hardening guide to mitigate this issue (SEC Consult Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65854CRITICAL9.8
  • PHPPHP
  • mineadmin/mineadmin
NoNoDec 12, 2025
CVE-2024-58303HIGH8.6
  • PHPPHP
  • fof/pretty-mail
NoNoDec 11, 2025
CVE-2025-67719HIGH8.5
  • PHPPHP
  • ibexa/user
NoYesDec 11, 2025
CVE-2025-67648HIGH7.1
  • PHPPHP
  • shopware/shopware
NoYesDec 11, 2025
CVE-2025-67737LOW3.1
  • PHPPHP
  • azuracast/azuracast
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management