CVE-2025-14523
📋 TL;DR
This vulnerability in libsoup's HTTP header handling allows attackers to send duplicate Host headers, creating a mismatch between proxy routing and backend interpretation. This enables request smuggling, cache poisoning, and host-based access control bypass. Systems using libsoup for HTTP processing with front-end proxies are affected.
💻 Affected Systems
- libsoup
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete bypass of security controls, cache poisoning affecting multiple users, and potential data exfiltration through request smuggling.
Likely Case
Cache poisoning leading to credential theft or malware distribution, and bypassing host-based access controls to reach restricted backend services.
If Mitigated
Limited impact with proper header validation at both proxy and backend layers, though some request smuggling may still occur.
🎯 Exploit Status
Exploitation requires network access to send HTTP requests but no authentication. The technique is similar to known request smuggling attacks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check specific distribution advisories (e.g., RHEL errata RHSA-2026:0421 through RHSA-2026:0867)
Vendor Advisory: https://access.redhat.com/errata/RHSA-2026:0421
Restart Required: Yes
Instructions:
1. Identify libsoup version on your system. 2. Apply updates via your package manager (e.g., 'yum update libsoup' for RHEL). 3. Restart services using libsoup.
🔧 Temporary Workarounds
Proxy Host Header Validation
linuxConfigure front-end proxies to reject or normalize duplicate Host headers before forwarding to backends.
# Example for nginx: add 'proxy_set_header Host $host;' to ensure single Host header
Application Layer Validation
allImplement custom middleware in applications to detect and reject duplicate Host headers.
🧯 If You Can't Patch
- Implement strict HTTP header validation at both proxy and application layers to reject duplicate Host headers.
- Use web application firewalls (WAFs) configured to detect and block requests with multiple Host headers.
🔍 How to Verify
Check if Vulnerable:
Check libsoup version against patched versions in vendor advisories. Test by sending HTTP requests with duplicate Host headers and observing backend behavior.
Check Version:
rpm -q libsoup (RHEL/Fedora) or dpkg -l libsoup (Debian/Ubuntu)
Verify Fix Applied:
After patching, verify that duplicate Host headers are rejected or normalized by libsoup. Test with the same duplicate header requests.
📡 Detection & Monitoring
Log Indicators:
- HTTP logs showing requests with multiple Host headers
- Proxy logs indicating routing mismatches between Host header values
Network Indicators:
- HTTP traffic containing duplicate Host headers in requests
- Unusual request patterns suggesting cache poisoning attempts
SIEM Query:
source="web_logs" AND http.headers CONTAINS "Host:" AND count(http.headers, "Host:") > 1
🔗 References
- https://access.redhat.com/errata/RHSA-2026:0421
- https://access.redhat.com/errata/RHSA-2026:0422
- https://access.redhat.com/errata/RHSA-2026:0423
- https://access.redhat.com/errata/RHSA-2026:0836
- https://access.redhat.com/errata/RHSA-2026:0867
- https://access.redhat.com/errata/RHSA-2026:0868
- https://access.redhat.com/errata/RHSA-2026:0905
- https://access.redhat.com/errata/RHSA-2026:0906
- https://access.redhat.com/errata/RHSA-2026:0907
- https://access.redhat.com/errata/RHSA-2026:0908
- https://access.redhat.com/errata/RHSA-2026:0909
- https://access.redhat.com/errata/RHSA-2026:0911
- https://access.redhat.com/errata/RHSA-2026:0925
- https://access.redhat.com/errata/RHSA-2026:1509
- https://access.redhat.com/errata/RHSA-2026:1569
- https://access.redhat.com/errata/RHSA-2026:1570
- https://access.redhat.com/errata/RHSA-2026:1571
- https://access.redhat.com/errata/RHSA-2026:1572
- https://access.redhat.com/security/cve/CVE-2025-14523
- https://bugzilla.redhat.com/show_bug.cgi?id=2421349