CVE-2025-48865 – Fabio HTTP Hop-by-Hop Header Manipulation Vulnerability

The following table lists the changes that have been made to the
CVE-2025-48865 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    May. 30, 2025

    Action Type Old Value New Value
    Added Description Fabio is an HTTP(S) and TCP router for deploying applications managed by consul. Prior to version 1.6.6, Fabio allows clients to remove X-Forwarded headers (except X-Forwarded-For) due to a vulnerability in how it processes hop-by-hop headers. Fabio adds HTTP headers like X-Forwarded-Host and X-Forwarded-Port when routing requests to backend applications. Since the receiving application should trust these headers, allowing HTTP clients to remove or modify them creates potential security vulnerabilities. Some of these custom headers can be removed and, in certain cases, manipulated. The attack relies on the behavior that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been patched in version 1.6.6.
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
    Added CWE CWE-345
    Added CWE CWE-348
    Added Reference https://github.com/fabiolb/fabio/commit/fdaf1e966162e9dd3b347ffdd0647b39dc71a1a3
    Added Reference https://github.com/fabiolb/fabio/releases/tag/v1.6.6
    Added Reference https://github.com/fabiolb/fabio/security/advisories/GHSA-q7p4-7xjv-j3wf
Share the Post:

Related Posts