Cyber Posture

CVE-2022-50910

CriticalPublic PoC

Published: 13 January 2026

Published
13 January 2026
Modified
02 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0056 68.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2022-50910 is a critical-severity Weak Password Recovery Mechanism for Forgotten Password (CWE-640) vulnerability in Beehiveforum Beehive Forum. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 31.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of untrusted inputs like the malicious Host header in forgot password requests to prevent injection and URL manipulation.

prevent

Mandates secure management of authenticators including password reset tokens to mitigate interception and unauthorized use via manipulated reset links.

preventdetect

Enforces boundary protection mechanisms such as web application firewalls to filter or block requests exploiting Host header injection in public-facing password reset functionality.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is a host header injection in a public-facing web application (Beehive Forum), enabling remote, unauthenticated account takeover via password reset token interception without user interaction.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Beehive Forum 1.5.2 contains a host header injection vulnerability in the forgot password functionality that allows attackers to manipulate password reset requests. Attackers can inject a malicious host header to intercept password reset tokens and change victim account passwords without…

more

direct authentication.

Deeper analysisAI

CVE-2022-50910 is a host header injection vulnerability in Beehive Forum version 1.5.2, specifically within the forgot password functionality. This issue, classified under CWE-640, enables attackers to manipulate password reset requests by injecting a malicious host header, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Remote attackers require no privileges, authentication, or user interaction to exploit this vulnerability over the network. By injecting a malicious host header, they can intercept password reset tokens sent to victims, allowing unauthorized password changes and full account takeover without direct authentication.

Advisories and references, including a Vulncheck advisory on Beehive Forum account takeover and an Exploit-DB entry (50923) with a public exploit, highlight the issue. The Beehive Forum project page on SourceForge and official website provide additional context, along with an Imgur-hosted proof-of-concept image. No specific patch or mitigation details are detailed in the provided information.

Details

CWE(s)

Affected Products

beehiveforum
beehive forum
1.5.2

CVEs Like This One

CVE-2026-25858Shared CWE-640
CVE-2025-63314Shared CWE-640
CVE-2026-42606Shared CWE-640
CVE-2020-37172Shared CWE-640
CVE-2026-29199Shared CWE-640
CVE-2026-40585Shared CWE-640
CVE-2026-1325Shared CWE-640
CVE-2025-12866Shared CWE-640
CVE-2026-2564Shared CWE-640
CVE-2026-24467Shared CWE-640

References