Description
HestiaCP versions 1.2.0 through 1.9.4 contain an IP spoofing vulnerability that allows unauthenticated remote attackers to bypass authentication security controls by supplying an arbitrary IP address in the CF-Connecting-IP HTTP header without verifying the request originated from Cloudflare's network. Attackers can exploit this to circumvent fail2ban brute-force protection, bypass per-user IP allowlists, and poison authentication audit logs by spoofing trusted IP addresses on each request.
Problem types
Product status
1.2.0 (semver)
f381e294500f671cf12716c638afd0bfde901f88 (git)
Credits
sutol
divinity76
References
mercuryiss.com.au/...-spoofing-cve-2026-43633-cve-2026-43634
github.com/hestiacp/hestiacp/issues/5229
github.com/hestiacp/hestiacp/pull/5273
github.com/...ommit/f381e294500f671cf12716c638afd0bfde901f88
www.vulncheck.com/...ip-spoofing-via-cf-connecting-ip-header