{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T04:23:02.626","vulnerabilities":[{"cve":{"id":"CVE-2025-50578","sourceIdentifier":"cve@mitre.org","published":"2025-07-30T16:15:28.177","lastModified":"2025-08-25T02:20:27.220","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"LinuxServer.io heimdall 2.6.3-ls307 contains a vulnerability in how it handles user-supplied HTTP headers, specifically `X-Forwarded-Host` and `Referer`. An unauthenticated remote attacker can manipulate these headers to perform Host Header Injection and Open Redirect attacks. This allows the loading of external resources from attacker-controlled domains and unintended redirection of users, potentially enabling phishing, UI redress, and session theft. The vulnerability exists due to insufficient validation and trust of untrusted input, affecting the integrity and trustworthiness of the application."},{"lang":"es","value":"LinuxServer.io heimdall 2.6.3-ls307 contiene una vulnerabilidad en la gestión de los encabezados HTTP proporcionados por el usuario, específicamente «X-Forwarded-Host» y «Referer». Un atacante remoto no autenticado puede manipular estos encabezados para realizar ataques de inyección de encabezado de host y redirección abierta. Esto permite la carga de recursos externos desde dominios controlados por el atacante y la redirección involuntaria de usuarios, lo que podría facilitar el phishing, la corrección de la interfaz de usuario y el robo de sesión. La vulnerabilidad existe debido a una validación y confianza insuficientes en entradas no confiables, lo que afecta la integridad y la fiabilidad de la aplicación."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-20"},{"lang":"en","value":"CWE-74"},{"lang":"en","value":"CWE-601"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:linuxserver:docker-heimdall:2.6.3-ls307:*:*:*:*:*:*:*","matchCriteriaId":"58A60C94-36AF-42A5-A1CD-CDA5C3A37F36"}]}]}],"references":[{"url":"https://github.com/linuxserver/Heimdall","source":"cve@mitre.org","tags":["Product"]},{"url":"https://github.com/linuxserver/Heimdall/issues/1451","source":"cve@mitre.org","tags":["Exploit","Issue Tracking"]},{"url":"https://medium.com/@juanfelipeoz.rar/cve-2025-50578-exploiting-host-header-injection-open-redirect-in-heimdall-application-733afceff2ea","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]}]}}]}