Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12811: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in Delinea Inc. Cloud Suite and Privileged Access Service

0
Medium
VulnerabilityCVE-2025-12811cvecve-2025-12811cwe-444
Published: Wed Feb 18 2026 (02/18/2026, 22:08:25 UTC)
Source: CVE Database V5
Vendor/Project: Delinea Inc.
Product: Cloud Suite and Privileged Access Service

Description

Improper Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') in Delinea Inc. Cloud Suite and Privileged Access Service. If you're not using the latest Server Suite agents, this fix requires that you upgrade to Server Suite 2023.1 (agent 6.0.1) or later. * If you cannot upgrade to Release 2023.1 (agent version 6.0.1) or later, you can choose one of the following versions: * Server Suite release 2023.0.5 (agent version 6.0.0-158) * Server Suite release 2022.1.10 (agent version 5.9.1-337)

AI-Powered Analysis

AILast updated: 02/18/2026, 22:41:14 UTC

Technical Analysis

CVE-2025-12811 is a vulnerability classified under CWE-444, involving inconsistent interpretation of HTTP requests, commonly known as HTTP Request Smuggling. This vulnerability exists in Delinea Inc.'s Cloud Suite and Privileged Access Service, specifically in versions 25.1 HF4 and earlier. HTTP Request Smuggling exploits discrepancies in how front-end and back-end servers parse and process HTTP requests, allowing attackers to craft malicious requests that can bypass security controls, poison web caches, hijack user sessions, or perform unauthorized actions. The vulnerability does not require any authentication or user interaction, making it accessible to remote attackers over the network. The CVSS 4.0 vector indicates low attack complexity and no privileges or user interaction needed, with partial impacts on confidentiality and integrity but no impact on availability. Although no active exploits have been reported, the nature of HTTP Request Smuggling vulnerabilities historically enables attackers to conduct sophisticated attacks such as web cache poisoning, request hijacking, and bypassing security filters. Delinea has addressed this issue in Server Suite 2023.1 (agent 6.0.1) and later versions, with alternative patches available in releases 2023.0.5 and 2022.1.10 for environments unable to upgrade immediately. Organizations using affected versions should prioritize patching to mitigate risks associated with this vulnerability.

Potential Impact

For European organizations, the impact of CVE-2025-12811 can be significant, especially for those relying on Delinea’s Cloud Suite and Privileged Access Service for managing privileged access and securing critical infrastructure. Exploitation could allow attackers to bypass security controls, potentially leading to unauthorized access to sensitive administrative functions, session hijacking, or data leakage. This could compromise the confidentiality and integrity of privileged credentials and sensitive operational data, increasing the risk of further lateral movement within networks. Given the critical role of privileged access management in regulatory compliance (e.g., GDPR, NIS Directive), exploitation could also result in legal and reputational damage. Although availability is not directly impacted, the indirect consequences of compromised privileged access could disrupt business operations. The absence of known exploits currently provides a window for proactive mitigation, but the medium severity rating and ease of exploitation necessitate urgent attention.

Mitigation Recommendations

1. Upgrade affected Delinea Cloud Suite and Privileged Access Service installations to Server Suite 2023.1 (agent 6.0.1) or later as the primary mitigation step. 2. If immediate upgrade is not feasible, apply patches available in Server Suite releases 2023.0.5 (agent 6.0.0-158) or 2022.1.10 (agent 5.9.1-337) to reduce exposure. 3. Implement strict HTTP request validation and normalization at the web application firewall (WAF) or reverse proxy level to detect and block malformed or suspicious HTTP requests indicative of request smuggling attempts. 4. Monitor HTTP traffic logs for anomalies such as unexpected request sequences or header inconsistencies that may signal exploitation attempts. 5. Conduct regular security assessments and penetration testing focused on HTTP request handling to identify residual weaknesses. 6. Ensure privileged access management policies enforce least privilege and session monitoring to limit potential damage from compromised sessions. 7. Maintain up-to-date threat intelligence feeds to stay informed about emerging exploits targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Delinea
Date Reserved
2025-11-06T16:31:44.269Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69963c866aea4a407aee80dc

Added to database: 2/18/2026, 10:26:14 PM

Last enriched: 2/18/2026, 10:41:14 PM

Last updated: 2/18/2026, 11:46:39 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats