CVE-2025-29993

5.3 MEDIUM

📋 TL;DR

PowerCMS versions before 6.6.1, 5.2.8, and 4.5.9 contain an HTTP header injection vulnerability (CWE-74) that allows attackers to manipulate email content, particularly password reset URLs. This could enable phishing attacks or account takeover by redirecting users to malicious sites. Organizations using vulnerable PowerCMS installations for email notifications are affected.

💻 Affected Systems

Products:
  • PowerCMS
Versions: Versions before 6.6.1, 5.2.8, and 4.5.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using PowerCMS email functionality, particularly password reset features.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could redirect password reset emails to malicious sites, leading to credential theft, account compromise, and potential lateral movement within the organization.

🟠

Likely Case

Targeted phishing attacks where users receive legitimate-looking password reset emails that redirect to attacker-controlled sites for credential harvesting.

🟢

If Mitigated

Limited impact with proper email security controls, user awareness training, and monitoring for suspicious password reset activities.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to inject HTTP headers, likely through authenticated access or other injection vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PowerCMS 6.6.1, 5.2.8, or 4.5.9

Vendor Advisory: https://www.powercms.jp/news/release-powercms-661-528-459.html

Restart Required: Yes

Instructions:

1. Backup your PowerCMS installation and database. 2. Download the patched version from the official PowerCMS website. 3. Replace the vulnerable files with the patched version. 4. Restart your web server. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable Password Reset Emails

all

Temporarily disable automated password reset email functionality in PowerCMS

Modify PowerCMS configuration to disable password reset emails

Implement Email Header Validation

all

Add input validation for email headers in PowerCMS configuration

Configure PowerCMS to validate and sanitize all email header inputs

🧯 If You Can't Patch

  • Implement network segmentation to isolate PowerCMS instances from critical systems
  • Enable detailed logging of all password reset attempts and email sending activities

🔍 How to Verify

Check if Vulnerable:

Check PowerCMS version in admin panel or by examining version files in installation directory

Check Version:

Check PowerCMS admin dashboard or examine /path/to/powercms/version.txt file

Verify Fix Applied:

Verify version number shows 6.6.1, 5.2.8, or 4.5.9 or higher in admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual email sending patterns
  • Multiple password reset requests from single IP
  • Modified email headers in logs

Network Indicators:

  • Unexpected outbound email traffic patterns
  • Connections to suspicious domains from email links

SIEM Query:

source="powercms_logs" AND (event="password_reset" OR event="email_sent") | stats count by src_ip, user

🔗 References

📤 Share & Export