Beehive Forum 1.5.2 contains a host header injection vulnerability in the forgot password functionality that allows attackers to manipulate password reset requests. Attackers can inject a malicious host header to intercept password reset tokens and change victim account passwords without direct authentication.
References
| Link | Resource |
|---|---|
| https://imgur.com/a/hVlgpCg | Exploit |
| https://sourceforge.net/projects/beehiveforum/ | Product |
| https://www.beehiveforum.co.uk/ | Product |
| https://www.exploit-db.com/exploits/50923 | Exploit |
| https://www.vulncheck.com/advisories/beehive-forum-account-takeover | Third Party Advisory |
| https://www.exploit-db.com/exploits/50923 | Exploit |
| https://www.vulncheck.com/advisories/beehive-forum-account-takeover | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-13 23:15
Updated : 2026-02-02 16:16
NVD link : CVE-2022-50910
Mitre link : CVE-2022-50910
CVE.ORG link : CVE-2022-50910
JSON object : View
Products Affected
beehiveforum
- beehive_forum
CWE
CWE-640
Weak Password Recovery Mechanism for Forgotten Password
