We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-48865

Fabio allows HTTP clients to manipulate custom headers it adds



Description

Fabio is an HTTP(S) and TCP router for deploying applications managed by consul. Prior to version 1.6.6, Fabio allows clients to remove X-Forwarded headers (except X-Forwarded-For) due to a vulnerability in how it processes hop-by-hop headers. Fabio adds HTTP headers like X-Forwarded-Host and X-Forwarded-Port when routing requests to backend applications. Since the receiving application should trust these headers, allowing HTTP clients to remove or modify them creates potential security vulnerabilities. Some of these custom headers can be removed and, in certain cases, manipulated. The attack relies on the behavior that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been patched in version 1.6.6.

Reserved 2025-05-27 | Published 2025-05-30 | Updated 2025-05-30 | Assigner GitHub_M


CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-345: Insufficient Verification of Data Authenticity

CWE-348: Use of Less Trusted Source

Product status

< 1.6.6
affected

References

github.com/.../fabio/security/advisories/GHSA-q7p4-7xjv-j3wf

github.com/...ommit/fdaf1e966162e9dd3b347ffdd0647b39dc71a1a3

github.com/fabiolb/fabio/releases/tag/v1.6.6

cve.org (CVE-2025-48865)

nvd.nist.gov (CVE-2025-48865)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-48865

Support options

Helpdesk Chat, Email, Knowledgebase