Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14523: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in Red Hat Red Hat Enterprise Linux 10

0
High
VulnerabilityCVE-2025-14523cvecve-2025-14523
Published: Thu Dec 11 2025 (12/11/2025, 12:30:59 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style attacks, cache poisoning, or bypassing host-based access controls when an attacker supplies duplicate Host headers.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 01:54:18 UTC

Technical Analysis

CVE-2025-14523 is a vulnerability found in the libsoup HTTP library used in Red Hat Enterprise Linux 10. The flaw arises from inconsistent interpretation of HTTP requests containing multiple Host headers. Specifically, libsoup processes the last Host header in the request for server-side routing, whereas many front-end proxies honor the first Host header. This inconsistency creates a scenario where the proxy routes the request to one backend server based on the first Host header, but the backend server processes the request as if it were intended for a different virtual host based on the last Host header. This mismatch can be exploited to perform HTTP request smuggling attacks, which allow attackers to bypass host-based access controls, poison caches, or manipulate backend routing logic. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS v3.1 score of 8.2 reflects high severity, with low attack complexity and no privileges required. Although no public exploits have been reported yet, the nature of the vulnerability suggests it could be leveraged to compromise confidentiality and integrity of web applications and services running on affected systems. The issue is particularly relevant in environments where reverse proxies or load balancers are used in front of Red Hat Enterprise Linux 10 servers running libsoup-based services.

Potential Impact

The impact of CVE-2025-14523 is significant for organizations worldwide that deploy Red Hat Enterprise Linux 10, especially in environments using reverse proxies or load balancers that rely on the first Host header for routing. Exploitation can lead to virtual host confusion, enabling attackers to smuggle HTTP requests past security controls, poison caches, or bypass host-based access restrictions. This can result in unauthorized access to sensitive data, manipulation of web application behavior, and potential lateral movement within networks. The confidentiality and integrity of affected systems and data are at risk, although availability impact is minimal. Given the remote, unauthenticated nature of the exploit, attackers can leverage this vulnerability to target critical infrastructure, cloud services, and enterprise applications, potentially leading to data breaches or service disruptions. Organizations with complex proxy architectures or multi-tenant web hosting environments are particularly vulnerable. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2025-14523, organizations should prioritize applying official patches or updates from Red Hat as soon as they become available. In the interim, administrators should audit and harden proxy and backend server configurations to ensure consistent Host header handling. This includes configuring proxies and backend servers to reject or sanitize requests containing multiple Host headers, enforcing strict validation of HTTP headers, and implementing web application firewalls (WAFs) with rules to detect and block request smuggling attempts. Network segmentation can limit the impact of successful exploitation. Monitoring HTTP traffic for anomalies related to multiple Host headers and unusual routing patterns can provide early detection. Additionally, organizations should review and update security policies to address potential risks from HTTP request smuggling and train security teams on this attack vector. Employing layered defenses and maintaining up-to-date threat intelligence will further reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-12-11T07:03:53.445Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693abef77d4c6f31f7ada077

Added to database: 12/11/2025, 12:54:15 PM

Last enriched: 3/20/2026, 1:54:18 AM

Last updated: 3/25/2026, 1:51:19 AM

Views: 241

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses