CVE-2025-27913
📋 TL;DR
This vulnerability allows attackers to manipulate email messages sent by Passbolt API by injecting malicious domain names via HTTP Host headers. It affects Passbolt API servers that were misconfigured during installation and ignored Health Check warnings. The vulnerability enables email spoofing and potential phishing attacks.
💻 Affected Systems
- Passbolt API
📦 What is this software?
Passbolt Api by Passbolt
⚠️ Risk & Real-World Impact
Worst Case
Attackers could send convincing phishing emails appearing to originate from legitimate Passbolt domains, leading to credential theft, account compromise, or malware distribution.
Likely Case
Email spoofing enabling targeted phishing campaigns against Passbolt users, potentially compromising individual accounts.
If Mitigated
No impact if proper installation procedures were followed and Health Check warnings were addressed.
🎯 Exploit Status
Requires attacker to control HTTP Host header and target misconfigured Passbolt installations.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 5 and later
Vendor Advisory: https://www.passbolt.com/incidents/host-header-injection
Restart Required: No
Instructions:
1. Upgrade Passbolt API to version 5 or later. 2. Verify installation follows official documentation. 3. Run Health Check and address any warnings.
🔧 Temporary Workarounds
Configure web server to validate Host headers
allConfigure your web server (Apache/Nginx) to validate and restrict acceptable Host headers
Implement reverse proxy with Host header validation
allPlace Passbolt behind a reverse proxy that validates and sanitizes Host headers
🧯 If You Can't Patch
- Ensure proper installation following official Passbolt documentation
- Run Health Check tool and address all warnings immediately
🔍 How to Verify
Check if Vulnerable:
Check if Passbolt API version is below 5 AND Health Check shows warnings about Host header configuration
Check Version:
Check Passbolt configuration file or admin interface for version information
Verify Fix Applied:
Verify Passbolt API version is 5 or higher AND Health Check shows no warnings about Host header configuration
📡 Detection & Monitoring
Log Indicators:
- Unusual Host header values in web server logs
- Multiple failed email delivery attempts with suspicious domains
Network Indicators:
- HTTP requests with manipulated Host headers to Passbolt API endpoints
SIEM Query:
source="web_server_logs" AND (Host:*malicious* OR Host:*suspicious*) AND uri="/passbolt/*"