CVE-2025-4035: Improper Handling of Case Sensitivity in Red Hat Red Hat Enterprise Linux 10
A flaw was found in libsoup. When handling cookies, libsoup clients mistakenly allow cookies to be set for public suffix domains if the domain contains at least two components and includes an uppercase character. This bypasses public suffix protections and could allow a malicious website to set cookies for domains it does not own, potentially leading to integrity issues such as session fixation.
AI Analysis
Technical Summary
CVE-2025-4035 is a vulnerability discovered in the libsoup HTTP client library, which is widely used in Red Hat Enterprise Linux 10 for handling HTTP communications. The flaw arises from improper handling of case sensitivity in domain names when setting cookies. Normally, libsoup enforces public suffix protections to prevent cookies from being set on public suffix domains (e.g., .com, .co.uk) to avoid cookie leakage and session fixation attacks. However, this vulnerability allows cookies to be set on public suffix domains if the domain name contains at least two components and includes uppercase characters, effectively bypassing these protections. This occurs because the domain name comparison is case-sensitive, and the logic fails to normalize or correctly handle uppercase letters, allowing a malicious website to set cookies for domains it does not own. The impact is primarily on integrity, as an attacker could perform session fixation by forcing a victim's browser to use attacker-controlled cookies for legitimate domains. The attack vector is remote and requires no privileges but does require user interaction, such as visiting a malicious website. There is no impact on confidentiality or availability. No known exploits have been reported in the wild at the time of disclosure. The vulnerability has a CVSS v3.1 base score of 4.3, categorized as medium severity. Red Hat Enterprise Linux 10 users should monitor for patches and updates from Red Hat and apply them promptly. Additionally, developers and system administrators should be aware of this issue when using libsoup in their applications or environments.
Potential Impact
The primary impact of CVE-2025-4035 is on the integrity of user sessions and cookie management within affected systems. By allowing cookies to be set on public suffix domains with uppercase characters, attackers can potentially perform session fixation attacks, leading to unauthorized session hijacking or manipulation. This could allow attackers to impersonate users or maintain persistent sessions without proper authentication. While confidentiality and availability are not directly impacted, the integrity compromise can lead to broader security issues, including unauthorized access to user accounts or services. Organizations relying on Red Hat Enterprise Linux 10 and libsoup for web communications may face increased risk of targeted web-based attacks, especially if users interact with malicious websites. The vulnerability's exploitation requires user interaction but no privileges, making it accessible to a wide range of attackers. The absence of known exploits in the wild currently limits immediate risk, but the potential for exploitation remains significant until patched.
Mitigation Recommendations
1. Apply official patches and updates from Red Hat as soon as they become available to address the libsoup vulnerability. 2. Until patches are deployed, consider implementing web filtering or network controls to block access to known malicious websites that could exploit this flaw. 3. Educate users about the risks of visiting untrusted or suspicious websites to reduce the likelihood of user interaction with malicious content. 4. Review and update application code that uses libsoup to ensure domain name handling normalizes case and enforces public suffix protections correctly. 5. Employ browser security features such as SameSite cookies and Content Security Policy (CSP) to limit cookie scope and reduce session fixation risks. 6. Monitor logs and network traffic for unusual cookie-setting behavior or session anomalies that could indicate exploitation attempts. 7. Consider deploying endpoint security solutions capable of detecting suspicious web activity related to cookie manipulation. 8. Coordinate with security teams to incorporate this vulnerability into vulnerability management and incident response plans.
Affected Countries
United States, Germany, India, China, United Kingdom, Japan, France, Canada, Australia, South Korea
CVE-2025-4035: Improper Handling of Case Sensitivity in Red Hat Red Hat Enterprise Linux 10
Description
A flaw was found in libsoup. When handling cookies, libsoup clients mistakenly allow cookies to be set for public suffix domains if the domain contains at least two components and includes an uppercase character. This bypasses public suffix protections and could allow a malicious website to set cookies for domains it does not own, potentially leading to integrity issues such as session fixation.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-4035 is a vulnerability discovered in the libsoup HTTP client library, which is widely used in Red Hat Enterprise Linux 10 for handling HTTP communications. The flaw arises from improper handling of case sensitivity in domain names when setting cookies. Normally, libsoup enforces public suffix protections to prevent cookies from being set on public suffix domains (e.g., .com, .co.uk) to avoid cookie leakage and session fixation attacks. However, this vulnerability allows cookies to be set on public suffix domains if the domain name contains at least two components and includes uppercase characters, effectively bypassing these protections. This occurs because the domain name comparison is case-sensitive, and the logic fails to normalize or correctly handle uppercase letters, allowing a malicious website to set cookies for domains it does not own. The impact is primarily on integrity, as an attacker could perform session fixation by forcing a victim's browser to use attacker-controlled cookies for legitimate domains. The attack vector is remote and requires no privileges but does require user interaction, such as visiting a malicious website. There is no impact on confidentiality or availability. No known exploits have been reported in the wild at the time of disclosure. The vulnerability has a CVSS v3.1 base score of 4.3, categorized as medium severity. Red Hat Enterprise Linux 10 users should monitor for patches and updates from Red Hat and apply them promptly. Additionally, developers and system administrators should be aware of this issue when using libsoup in their applications or environments.
Potential Impact
The primary impact of CVE-2025-4035 is on the integrity of user sessions and cookie management within affected systems. By allowing cookies to be set on public suffix domains with uppercase characters, attackers can potentially perform session fixation attacks, leading to unauthorized session hijacking or manipulation. This could allow attackers to impersonate users or maintain persistent sessions without proper authentication. While confidentiality and availability are not directly impacted, the integrity compromise can lead to broader security issues, including unauthorized access to user accounts or services. Organizations relying on Red Hat Enterprise Linux 10 and libsoup for web communications may face increased risk of targeted web-based attacks, especially if users interact with malicious websites. The vulnerability's exploitation requires user interaction but no privileges, making it accessible to a wide range of attackers. The absence of known exploits in the wild currently limits immediate risk, but the potential for exploitation remains significant until patched.
Mitigation Recommendations
1. Apply official patches and updates from Red Hat as soon as they become available to address the libsoup vulnerability. 2. Until patches are deployed, consider implementing web filtering or network controls to block access to known malicious websites that could exploit this flaw. 3. Educate users about the risks of visiting untrusted or suspicious websites to reduce the likelihood of user interaction with malicious content. 4. Review and update application code that uses libsoup to ensure domain name handling normalizes case and enforces public suffix protections correctly. 5. Employ browser security features such as SameSite cookies and Content Security Policy (CSP) to limit cookie scope and reduce session fixation risks. 6. Monitor logs and network traffic for unusual cookie-setting behavior or session anomalies that could indicate exploitation attempts. 7. Consider deploying endpoint security solutions capable of detecting suspicious web activity related to cookie manipulation. 8. Coordinate with security teams to incorporate this vulnerability into vulnerability management and incident response plans.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-04-28T06:04:50.855Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef0ef
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 2/27/2026, 2:13:14 PM
Last updated: 3/24/2026, 7:47:10 PM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.