{"uuid": "2098a9cd-0240-4611-85e7-bb21ac69eaea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-3026", "type": "seen", "source": "https://t.me/cvedetector/21583", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3026 - EJBCA Host Header Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3026 \nPublished : March 31, 2025, 11:15 a.m. | 1\u00a0hour, 33\u00a0minutes ago \nDescription : The vulnerability exists in the EJBCA service, version 8.0 Enterprise. Not tested in higher versions. By modifying the \u2018Host\u2019 header in an HTTP request, it is possible to manipulate the generated links and thus redirect the client to a different base URL.  In this way, an attacker could insert his own server for the client to send HTTP requests, provided he succeeds in exploiting it. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T15:00:50.000000Z"}