{"id":"CVE-2020-10966","details":"In the Password Reset Module in VESTA Control Panel through 0.9.8-25 and Hestia Control Panel before 1.1.1, Host header manipulation leads to account takeover because the victim receives a reset URL containing an attacker-controlled server name.","modified":"2026-03-13T14:36:58.329117Z","published":"2020-03-25T23:15:16.217Z","references":[{"type":"ADVISORY","url":"https://github.com/hestiacp/hestiacp/releases/tag/1.1.1"},{"type":"FIX","url":"https://github.com/serghey-rodin/vesta/commit/c3c4de43d6701560f604ca7996f717b08e3d7d1d"},{"type":"EVIDENCE","url":"https://github.com/hestiacp/hestiacp/issues/748"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/hestiacp/hestiacp","events":[{"introduced":"0"},{"fixed":"91b1cd544b34c83f449d44fddf852dbe45621c84"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.1.1"}]}},{"type":"GIT","repo":"https://github.com/outroll/vesta","events":[{"introduced":"0"},{"fixed":"c3c4de43d6701560f604ca7996f717b08e3d7d1d"}]},{"type":"GIT","repo":"https://github.com/serghey-rodin/vesta","events":[{"introduced":"0"},{"last_affected":"868dd8b146e76ea3c83c26855ae2f60b22d989d2"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.9.8-25"}]}}],"versions":["0.9.8-10","0.9.8-11","0.9.8-12","0.9.8-13","0.9.8-15","0.9.8-16","0.9.8-17","0.9.8-18","0.9.8-19","0.9.8-20","0.9.8-23","0.9.8-24","0.9.8-25","0.9.8-28","1.0.1","1.00.0-190618","1.1.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-10966.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}]}