CVE-2025-26803
📋 TL;DR
A vulnerability in Phusion Passenger's HTTP parser allows denial of service attacks when processing requests with invalid HTTP methods. This affects web servers running Passenger 6.0.21 through 6.0.25. Attackers can crash the Passenger process by sending specially crafted HTTP requests.
💻 Affected Systems
- Phusion Passenger
📦 What is this software?
Passenger by Phusion
⚠️ Risk & Real-World Impact
Worst Case
Complete service unavailability for all applications hosted by Passenger, requiring manual restart of the Passenger process or web server.
Likely Case
Temporary service disruption affecting specific Passenger instances until automatic or manual recovery occurs.
If Mitigated
Minimal impact with proper monitoring and automated recovery mechanisms in place.
🎯 Exploit Status
Exploitation requires sending HTTP requests with invalid methods, which is trivial to implement.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.0.26
Vendor Advisory: https://blog.phusion.nl/2025/02/19/passenger-6-0-26/
Restart Required: Yes
Instructions:
1. Update Passenger gem: gem update passenger
2. Restart Passenger: passenger-config restart-app
3. Verify version: passenger --version
🔧 Temporary Workarounds
HTTP Method Filtering
allConfigure web server or application firewall to reject requests with invalid HTTP methods before they reach Passenger.
🧯 If You Can't Patch
- Implement rate limiting and request filtering at the edge (CDN, WAF, load balancer)
- Set up automated monitoring and alerting for Passenger process crashes with auto-restart capabilities
🔍 How to Verify
Check if Vulnerable:
Check Passenger version: passenger --version | grep -E '6\.0\.(2[1-5])'
Check Version:
passenger --version
Verify Fix Applied:
Verify version is 6.0.26 or higher: passenger --version | grep -E '6\.0\.(2[6-9]|[3-9][0-9])'
📡 Detection & Monitoring
Log Indicators:
- Passenger process crashes
- HTTP 400/500 errors for requests with unusual methods
- Application restarts in Passenger logs
Network Indicators:
- HTTP requests with invalid/non-standard methods (e.g., 'INVALID', 'TEST', malformed)
SIEM Query:
source="passenger.log" AND ("crash" OR "restart" OR "abnormal exit")
🔗 References
- https://blog.phusion.nl/2025/02/19/passenger-6-0-26/
- https://github.com/phusion/passenger/commit/bb15591646687064ab2d578d5f9660b2a4168017
- https://github.com/phusion/passenger/compare/release-6.0.25...release-6.0.26
- https://github.com/phusion/passenger/releases/tag/release-6.0.26
- https://www.phusionpassenger.com/support