A Host Header Poisoning vulnerability exists in Monica 4.1.2 due to improper handling of the HTTP Host header in app/Providers/AppServiceProvider.php, combined with the default misconfiguration where the "app.force_url" is not set and default is "false". The application generates absolute URLs (such as those used in password reset emails) using the user-supplied Host header. This allows remote attackers to poison the password reset link sent to a victim,
References
| Link | Resource |
|---|---|
| https://github.com/hungnqdz/cve-research/blob/main/CVE-2026-26747.md | Exploit Vendor Advisory |
| https://github.com/monicahq/monica | Product |
Configurations
History
No history.
Information
Published : 2026-02-20 17:25
Updated : 2026-02-26 02:42
NVD link : CVE-2026-26747
Mitre link : CVE-2026-26747
CVE.ORG link : CVE-2026-26747
JSON object : View
Products Affected
monicahq
- monica
CWE
CWE-644
Improper Neutralization of HTTP Headers for Scripting Syntax
