Drawing-Captcha APP provides interactive, engaging verification for Web-Based Applications. The vulnerability is a Host Header Injection in the /register and /confirm-email endpoints. It allows an attacker to manipulate the Host header in HTTP requests to generate malicious email confirmation links. These links can redirect users to attacker-controlled domains. This vulnerability affects all users relying on email confirmation for account registration or verification. This vulnerability is fixed in 1.2.5-alpha-patch.
                
            CVSS
                No CVSS.
References
                    Configurations
                    No configuration.
History
                    17 Oct 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/Drawing-Captcha/Drawing-Captcha-APP/issues/30 - | 
16 Oct 2025, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-10-16 19:15
Updated : 2025-10-21 19:31
NVD link : CVE-2025-62428
Mitre link : CVE-2025-62428
CVE.ORG link : CVE-2025-62428
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-601
                        
            URL Redirection to Untrusted Site ('Open Redirect')
