CVE-2025-31698

Source
https://cve.org/CVERecord?id=CVE-2025-31698
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-31698.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-31698
Downstream
Published
2025-06-19T10:15:20.980Z
Modified
2026-02-03T07:39:29.898648Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

ACL configured in ip_allow.config or remap.config does not use IP addresses that are provided by PROXY protocol.

Users can use a new setting (proxy.config.acl.subjects) to choose which IP addresses to use for the ACL if Apache Traffic Server is configured to accept PROXY protocol.  This issue affects undefined: from 10.0.0 through 10.0.6, from 9.0.0 through 9.2.10.

Users are recommended to upgrade to version 9.2.11 or 10.0.6, which fixes the issue.

References

Affected packages

Git / github.com/apache/trafficserver

Affected ranges

Affected versions

10.*
10.0.0
10.0.0-rc0
10.0.1
10.0.1-rc0
10.0.1-rc1
10.0.2
10.0.2-rc0
10.0.3
10.0.3-rc0
10.0.3-rc1
10.0.4
10.0.4-rc0
10.0.5
10.0.5-rc0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-31698.json"