CVE-2025-13434

A weakness has been identified in jameschz Hush Framework 2.0. The impacted element is an unknown function of the file Hush\hush-lib\hush\Util.php of the component HTTP Host Header Handler. This manipulation of the argument $_SERVER['HOST'] causes improper neutralization of http headers for scripting syntax. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/lakshayyverma/CVE-Discovery/blob/main/hush.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.332978 Permissions Required VDB Entry
https://vuldb.com/?id.332978 Third Party Advisory VDB Entry
https://vuldb.com/?submit.687568 Third Party Advisory VDB Entry
https://github.com/lakshayyverma/CVE-Discovery/blob/main/hush.md Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jameschz:hush:2.0:*:*:*:*:*:*:*

History

11 Dec 2025, 19:06

Type Values Removed Values Added
First Time Jameschz
Jameschz hush
CPE cpe:2.3:a:jameschz:hush:2.0:*:*:*:*:*:*:*
References () https://github.com/lakshayyverma/CVE-Discovery/blob/main/hush.md - () https://github.com/lakshayyverma/CVE-Discovery/blob/main/hush.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.332978 - () https://vuldb.com/?ctiid.332978 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.332978 - () https://vuldb.com/?id.332978 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.687568 - () https://vuldb.com/?submit.687568 - Third Party Advisory, VDB Entry

20 Nov 2025, 15:17

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-20 15:17

Updated : 2025-12-11 19:06


NVD link : CVE-2025-13434

Mitre link : CVE-2025-13434

CVE.ORG link : CVE-2025-13434


JSON object : View

Products Affected

jameschz

  • hush
CWE
CWE-644

Improper Neutralization of HTTP Headers for Scripting Syntax