CVE-2025-48865

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-48865
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-48865.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-48865
Aliases
Related
Published
2025-05-30T07:15:23Z
Modified
2025-05-31T03:50:47.254369Z
Summary
[none]
Details

Fabio is an HTTP(S) and TCP router for deploying applications managed by consul. Prior to version 1.6.6, Fabio allows clients to remove X-Forwarded headers (except X-Forwarded-For) due to a vulnerability in how it processes hop-by-hop headers. Fabio adds HTTP headers like X-Forwarded-Host and X-Forwarded-Port when routing requests to backend applications. Since the receiving application should trust these headers, allowing HTTP clients to remove or modify them creates potential security vulnerabilities. Some of these custom headers can be removed and, in certain cases, manipulated. The attack relies on the behavior that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been patched in version 1.6.6.

References

Affected packages

Git / github.com/fabiolb/fabio

Affected ranges

Type
GIT
Repo
https://github.com/fabiolb/fabio
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v1.*

v1.0.0
v1.0.1
v1.0.2
v1.0.3
v1.0.4
v1.0.5
v1.0.6
v1.0.7
v1.0.8
v1.1
v1.1.1
v1.1.2
v1.1.3
v1.1.3rc2
v1.1.4
v1.1.5
v1.1.6
v1.1rc1
v1.2
v1.2.1
v1.3
v1.3.1
v1.3.2
v1.3.3
v1.3.4
v1.3.5
v1.3.6
v1.3.7
v1.3.8
v1.4
v1.4.1
v1.4.2
v1.4.3
v1.4.4
v1.5.0
v1.5.1
v1.5.10
v1.5.11
v1.5.11-wrong
v1.5.12
v1.5.13
v1.5.14
v1.5.15
v1.5.2
v1.5.3
v1.5.4
v1.5.5
v1.5.6
v1.5.7
v1.5.8
v1.5.9
v1.6.0
v1.6.1
v1.6.2
v1.6.3
v1.6.4
v1.6.5