Hacksplaining
  • For Teams
Log in Start Learning

Host Header Poisoning

If your code assumes the Host header of the HTTP request is to be trusted, you are running a big security risk. For example, if the password reset emails your website generates rely on the supplied value of Host header, it gives an attacker an easy way to steal credentials.

The Host Header
GET /login HTTP/1.1
Host: website.com
Connection: keep-alive
Content-Type: text/html
Hacksplaining

Defend your code.

Learn

All Lessons AI Prompt Injection SQL Injection XSS CSRF

Teams

For Teams Features Pricing FAQ

Resources

Glossary OWASP Top 10 PCI Compliance Book

Legal

Privacy Terms DPA Subprocessors

© 2026 Hacksplaining. Built with in Seattle, WA, USA

Need help? Reach out to support@hacksplaining.com