CVE-2025-23167: Vulnerability in nodejs node
A flaw in Node.js 20's HTTP parser allows improper termination of HTTP/1 headers using `\r\n\rX` instead of the required `\r\n\r\n`. This inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests. The issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination. Impact: * This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade.
AI Analysis
Technical Summary
CVE-2025-23167 is a medium-severity vulnerability affecting Node.js version 20.x prior to the upgrade of the embedded HTTP parser library, llhttp, to version 9. The flaw lies in the HTTP/1 header parsing logic, where the parser incorrectly accepts an improper header termination sequence '\r\n\rX' instead of the mandated '\r\n\r\n'. This parsing inconsistency enables HTTP request smuggling attacks. Request smuggling exploits discrepancies in how front-end proxies and back-end servers parse HTTP requests, allowing attackers to bypass proxy-based access controls, inject unauthorized requests, or manipulate HTTP traffic. The vulnerability specifically impacts Node.js 20.x applications that rely on the vulnerable llhttp parser version. The issue was resolved by upgrading llhttp to version 9, which enforces strict adherence to HTTP header termination rules. The CVSS v3.0 score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, no privileges or user interaction required, and partial confidentiality and integrity impact but no availability impact. No known exploits are currently reported in the wild. The CWE classification is CWE-444 (Inconsistent Interpretation of HTTP Requests). This vulnerability is critical for applications exposing HTTP services through Node.js 20.x, especially those deployed behind proxies or load balancers that rely on consistent HTTP parsing for security controls.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to web applications and services built on Node.js 20.x that handle HTTP/1 traffic. Exploitation could allow attackers to bypass proxy-based access controls, potentially leading to unauthorized access to internal resources, data leakage, or manipulation of HTTP requests. This can undermine confidentiality and integrity of communications within enterprise networks. Given the widespread use of Node.js in web development across Europe, especially in sectors like finance, e-commerce, and public services, the impact could be significant if vulnerable versions are deployed in production environments. Additionally, organizations relying on reverse proxies or API gateways that do not adequately normalize HTTP requests may be more susceptible. While no availability impact is expected, the ability to smuggle requests can facilitate further attacks such as session hijacking, privilege escalation, or injection attacks, amplifying the threat. The absence of known exploits currently reduces immediate risk but does not eliminate the potential for future exploitation.
Mitigation Recommendations
European organizations should immediately audit their Node.js environments to identify any instances running version 20.x with the vulnerable llhttp parser version. The primary mitigation is to upgrade Node.js to a version that includes llhttp version 9 or later, ensuring strict HTTP header parsing compliance. For environments where immediate upgrade is not feasible, deploying Web Application Firewalls (WAFs) or reverse proxies capable of normalizing and validating HTTP headers can help detect and block malformed requests attempting to exploit this vulnerability. Network monitoring should be enhanced to detect anomalous HTTP traffic patterns indicative of request smuggling attempts. Security teams should also review proxy and load balancer configurations to ensure consistent HTTP parsing behavior across the infrastructure. Finally, developers should be educated about the risks of request smuggling and encouraged to adopt secure coding practices and dependency management to promptly apply security patches.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-23167: Vulnerability in nodejs node
Description
A flaw in Node.js 20's HTTP parser allows improper termination of HTTP/1 headers using `\r\n\rX` instead of the required `\r\n\r\n`. This inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests. The issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination. Impact: * This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade.
AI-Powered Analysis
Technical Analysis
CVE-2025-23167 is a medium-severity vulnerability affecting Node.js version 20.x prior to the upgrade of the embedded HTTP parser library, llhttp, to version 9. The flaw lies in the HTTP/1 header parsing logic, where the parser incorrectly accepts an improper header termination sequence '\r\n\rX' instead of the mandated '\r\n\r\n'. This parsing inconsistency enables HTTP request smuggling attacks. Request smuggling exploits discrepancies in how front-end proxies and back-end servers parse HTTP requests, allowing attackers to bypass proxy-based access controls, inject unauthorized requests, or manipulate HTTP traffic. The vulnerability specifically impacts Node.js 20.x applications that rely on the vulnerable llhttp parser version. The issue was resolved by upgrading llhttp to version 9, which enforces strict adherence to HTTP header termination rules. The CVSS v3.0 score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, no privileges or user interaction required, and partial confidentiality and integrity impact but no availability impact. No known exploits are currently reported in the wild. The CWE classification is CWE-444 (Inconsistent Interpretation of HTTP Requests). This vulnerability is critical for applications exposing HTTP services through Node.js 20.x, especially those deployed behind proxies or load balancers that rely on consistent HTTP parsing for security controls.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to web applications and services built on Node.js 20.x that handle HTTP/1 traffic. Exploitation could allow attackers to bypass proxy-based access controls, potentially leading to unauthorized access to internal resources, data leakage, or manipulation of HTTP requests. This can undermine confidentiality and integrity of communications within enterprise networks. Given the widespread use of Node.js in web development across Europe, especially in sectors like finance, e-commerce, and public services, the impact could be significant if vulnerable versions are deployed in production environments. Additionally, organizations relying on reverse proxies or API gateways that do not adequately normalize HTTP requests may be more susceptible. While no availability impact is expected, the ability to smuggle requests can facilitate further attacks such as session hijacking, privilege escalation, or injection attacks, amplifying the threat. The absence of known exploits currently reduces immediate risk but does not eliminate the potential for future exploitation.
Mitigation Recommendations
European organizations should immediately audit their Node.js environments to identify any instances running version 20.x with the vulnerable llhttp parser version. The primary mitigation is to upgrade Node.js to a version that includes llhttp version 9 or later, ensuring strict HTTP header parsing compliance. For environments where immediate upgrade is not feasible, deploying Web Application Firewalls (WAFs) or reverse proxies capable of normalizing and validating HTTP headers can help detect and block malformed requests attempting to exploit this vulnerability. Network monitoring should be enhanced to detect anomalous HTTP traffic patterns indicative of request smuggling attempts. Security teams should also review proxy and load balancer configurations to ensure consistent HTTP parsing behavior across the infrastructure. Finally, developers should be educated about the risks of request smuggling and encouraged to adopt secure coding practices and dependency management to promptly apply security patches.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- hackerone
- Date Reserved
- 2025-01-12T01:00:00.648Z
- Cisa Enriched
- true
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb6de
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 10:48:34 AM
Last updated: 1/7/2026, 6:08:21 AM
Views: 68
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.