Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4035: Improper Handling of Case Sensitivity in Red Hat Red Hat Enterprise Linux 10

0
Medium
VulnerabilityCVE-2025-4035cvecve-2025-4035
Published: Tue Apr 29 2025 (04/29/2025, 12:56:22 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in libsoup. When handling cookies, libsoup clients mistakenly allow cookies to be set for public suffix domains if the domain contains at least two components and includes an uppercase character. This bypasses public suffix protections and could allow a malicious website to set cookies for domains it does not own, potentially leading to integrity issues such as session fixation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:13:14 UTC

Technical Analysis

CVE-2025-4035 is a vulnerability discovered in the libsoup HTTP client library, which is widely used in Red Hat Enterprise Linux 10 for handling HTTP communications. The flaw arises from improper handling of case sensitivity in domain names when setting cookies. Normally, libsoup enforces public suffix protections to prevent cookies from being set on public suffix domains (e.g., .com, .co.uk) to avoid cookie leakage and session fixation attacks. However, this vulnerability allows cookies to be set on public suffix domains if the domain name contains at least two components and includes uppercase characters, effectively bypassing these protections. This occurs because the domain name comparison is case-sensitive, and the logic fails to normalize or correctly handle uppercase letters, allowing a malicious website to set cookies for domains it does not own. The impact is primarily on integrity, as an attacker could perform session fixation by forcing a victim's browser to use attacker-controlled cookies for legitimate domains. The attack vector is remote and requires no privileges but does require user interaction, such as visiting a malicious website. There is no impact on confidentiality or availability. No known exploits have been reported in the wild at the time of disclosure. The vulnerability has a CVSS v3.1 base score of 4.3, categorized as medium severity. Red Hat Enterprise Linux 10 users should monitor for patches and updates from Red Hat and apply them promptly. Additionally, developers and system administrators should be aware of this issue when using libsoup in their applications or environments.

Potential Impact

The primary impact of CVE-2025-4035 is on the integrity of user sessions and cookie management within affected systems. By allowing cookies to be set on public suffix domains with uppercase characters, attackers can potentially perform session fixation attacks, leading to unauthorized session hijacking or manipulation. This could allow attackers to impersonate users or maintain persistent sessions without proper authentication. While confidentiality and availability are not directly impacted, the integrity compromise can lead to broader security issues, including unauthorized access to user accounts or services. Organizations relying on Red Hat Enterprise Linux 10 and libsoup for web communications may face increased risk of targeted web-based attacks, especially if users interact with malicious websites. The vulnerability's exploitation requires user interaction but no privileges, making it accessible to a wide range of attackers. The absence of known exploits in the wild currently limits immediate risk, but the potential for exploitation remains significant until patched.

Mitigation Recommendations

1. Apply official patches and updates from Red Hat as soon as they become available to address the libsoup vulnerability. 2. Until patches are deployed, consider implementing web filtering or network controls to block access to known malicious websites that could exploit this flaw. 3. Educate users about the risks of visiting untrusted or suspicious websites to reduce the likelihood of user interaction with malicious content. 4. Review and update application code that uses libsoup to ensure domain name handling normalizes case and enforces public suffix protections correctly. 5. Employ browser security features such as SameSite cookies and Content Security Policy (CSP) to limit cookie scope and reduce session fixation risks. 6. Monitor logs and network traffic for unusual cookie-setting behavior or session anomalies that could indicate exploitation attempts. 7. Consider deploying endpoint security solutions capable of detecting suspicious web activity related to cookie manipulation. 8. Coordinate with security teams to incorporate this vulnerability into vulnerability management and incident response plans.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-04-28T06:04:50.855Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef0ef

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 2/27/2026, 2:13:14 PM

Last updated: 3/24/2026, 7:47:10 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses