A weakness has been identified in jameschz Hush Framework 2.0. The impacted element is an unknown function of the file Hush\hush-lib\hush\Util.php of the component HTTP Host Header Handler. This manipulation of the argument $_SERVER['HOST'] causes improper neutralization of http headers for scripting syntax. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/lakshayyverma/CVE-Discovery/blob/main/hush.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.332978 | Permissions Required VDB Entry |
| https://vuldb.com/?id.332978 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.687568 | Third Party Advisory VDB Entry |
| https://github.com/lakshayyverma/CVE-Discovery/blob/main/hush.md | Exploit Third Party Advisory |
Configurations
History
11 Dec 2025, 19:06
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Jameschz
Jameschz hush |
|
| CPE | cpe:2.3:a:jameschz:hush:2.0:*:*:*:*:*:*:* | |
| References | () https://github.com/lakshayyverma/CVE-Discovery/blob/main/hush.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.332978 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.332978 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.687568 - Third Party Advisory, VDB Entry |
20 Nov 2025, 15:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-20 15:17
Updated : 2025-12-11 19:06
NVD link : CVE-2025-13434
Mitre link : CVE-2025-13434
CVE.ORG link : CVE-2025-13434
JSON object : View
Products Affected
jameschz
- hush
CWE
CWE-644
Improper Neutralization of HTTP Headers for Scripting Syntax
