CVE-2025-23167: Vulnerability in nodejs node
A flaw in Node.js 20's HTTP parser allows improper termination of HTTP/1 headers using `\r\n\rX` instead of the required `\r\n\r\n`. This inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests. The issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination. Impact: * This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade.
AI Analysis
Technical Summary
CVE-2025-23167 is a medium-severity vulnerability affecting Node.js version 20.x prior to the upgrade of the embedded HTTP parser library, llhttp, to version 9. The flaw lies in the HTTP/1 header parsing logic, where the parser incorrectly accepts an improper header termination sequence '\r\n\rX' instead of the mandated '\r\n\r\n'. This parsing inconsistency enables HTTP request smuggling attacks. Request smuggling exploits discrepancies in how front-end proxies and back-end servers parse HTTP requests, allowing attackers to bypass proxy-based access controls, inject unauthorized requests, or manipulate HTTP traffic. The vulnerability specifically impacts Node.js 20.x applications that rely on the vulnerable llhttp parser version. The issue was resolved by upgrading llhttp to version 9, which enforces strict adherence to HTTP header termination rules. The CVSS v3.0 score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, no privileges or user interaction required, and partial confidentiality and integrity impact but no availability impact. No known exploits are currently reported in the wild. The CWE classification is CWE-444 (Inconsistent Interpretation of HTTP Requests). This vulnerability is critical for applications exposing HTTP services through Node.js 20.x, especially those deployed behind proxies or load balancers that rely on consistent HTTP parsing for security controls.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to web applications and services built on Node.js 20.x that handle HTTP/1 traffic. Exploitation could allow attackers to bypass proxy-based access controls, potentially leading to unauthorized access to internal resources, data leakage, or manipulation of HTTP requests. This can undermine confidentiality and integrity of communications within enterprise networks. Given the widespread use of Node.js in web development across Europe, especially in sectors like finance, e-commerce, and public services, the impact could be significant if vulnerable versions are deployed in production environments. Additionally, organizations relying on reverse proxies or API gateways that do not adequately normalize HTTP requests may be more susceptible. While no availability impact is expected, the ability to smuggle requests can facilitate further attacks such as session hijacking, privilege escalation, or injection attacks, amplifying the threat. The absence of known exploits currently reduces immediate risk but does not eliminate the potential for future exploitation.
Mitigation Recommendations
European organizations should immediately audit their Node.js environments to identify any instances running version 20.x with the vulnerable llhttp parser version. The primary mitigation is to upgrade Node.js to a version that includes llhttp version 9 or later, ensuring strict HTTP header parsing compliance. For environments where immediate upgrade is not feasible, deploying Web Application Firewalls (WAFs) or reverse proxies capable of normalizing and validating HTTP headers can help detect and block malformed requests attempting to exploit this vulnerability. Network monitoring should be enhanced to detect anomalous HTTP traffic patterns indicative of request smuggling attempts. Security teams should also review proxy and load balancer configurations to ensure consistent HTTP parsing behavior across the infrastructure. Finally, developers should be educated about the risks of request smuggling and encouraged to adopt secure coding practices and dependency management to promptly apply security patches.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-23167: Vulnerability in nodejs node
Description
A flaw in Node.js 20's HTTP parser allows improper termination of HTTP/1 headers using `\r\n\rX` instead of the required `\r\n\r\n`. This inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests. The issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination. Impact: * This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade.
AI-Powered Analysis
Technical Analysis
CVE-2025-23167 is a medium-severity vulnerability affecting Node.js version 20.x prior to the upgrade of the embedded HTTP parser library, llhttp, to version 9. The flaw lies in the HTTP/1 header parsing logic, where the parser incorrectly accepts an improper header termination sequence '\r\n\rX' instead of the mandated '\r\n\r\n'. This parsing inconsistency enables HTTP request smuggling attacks. Request smuggling exploits discrepancies in how front-end proxies and back-end servers parse HTTP requests, allowing attackers to bypass proxy-based access controls, inject unauthorized requests, or manipulate HTTP traffic. The vulnerability specifically impacts Node.js 20.x applications that rely on the vulnerable llhttp parser version. The issue was resolved by upgrading llhttp to version 9, which enforces strict adherence to HTTP header termination rules. The CVSS v3.0 score is 6.5, reflecting a medium severity with network attack vector, low attack complexity, no privileges or user interaction required, and partial confidentiality and integrity impact but no availability impact. No known exploits are currently reported in the wild. The CWE classification is CWE-444 (Inconsistent Interpretation of HTTP Requests). This vulnerability is critical for applications exposing HTTP services through Node.js 20.x, especially those deployed behind proxies or load balancers that rely on consistent HTTP parsing for security controls.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to web applications and services built on Node.js 20.x that handle HTTP/1 traffic. Exploitation could allow attackers to bypass proxy-based access controls, potentially leading to unauthorized access to internal resources, data leakage, or manipulation of HTTP requests. This can undermine confidentiality and integrity of communications within enterprise networks. Given the widespread use of Node.js in web development across Europe, especially in sectors like finance, e-commerce, and public services, the impact could be significant if vulnerable versions are deployed in production environments. Additionally, organizations relying on reverse proxies or API gateways that do not adequately normalize HTTP requests may be more susceptible. While no availability impact is expected, the ability to smuggle requests can facilitate further attacks such as session hijacking, privilege escalation, or injection attacks, amplifying the threat. The absence of known exploits currently reduces immediate risk but does not eliminate the potential for future exploitation.
Mitigation Recommendations
European organizations should immediately audit their Node.js environments to identify any instances running version 20.x with the vulnerable llhttp parser version. The primary mitigation is to upgrade Node.js to a version that includes llhttp version 9 or later, ensuring strict HTTP header parsing compliance. For environments where immediate upgrade is not feasible, deploying Web Application Firewalls (WAFs) or reverse proxies capable of normalizing and validating HTTP headers can help detect and block malformed requests attempting to exploit this vulnerability. Network monitoring should be enhanced to detect anomalous HTTP traffic patterns indicative of request smuggling attempts. Security teams should also review proxy and load balancer configurations to ensure consistent HTTP parsing behavior across the infrastructure. Finally, developers should be educated about the risks of request smuggling and encouraged to adopt secure coding practices and dependency management to promptly apply security patches.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- hackerone
- Date Reserved
- 2025-01-12T01:00:00.648Z
- Cisa Enriched
- true
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb6de
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 10:48:34 AM
Last updated: 8/13/2025, 8:13:28 PM
Views: 20
Related Threats
CVE-2025-9007: Buffer Overflow in Tenda CH22
HighCVE-2025-9006: Buffer Overflow in Tenda CH22
HighCVE-2025-9005: Information Exposure Through Error Message in mtons mblog
MediumCVE-2025-9004: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-9003: Cross Site Scripting in D-Link DIR-818LW
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.