Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46421: Exposure of Sensitive System Information to an Unauthorized Control Sphere

0
Medium
VulnerabilityCVE-2025-46421cvecve-2025-46421
Published: Thu Apr 24 2025 (04/24/2025, 13:01:24 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect.

AI-Powered Analysis

AILast updated: 11/18/2025, 09:31:12 UTC

Technical Analysis

CVE-2025-46421 is a vulnerability discovered in libsoup, a GNOME HTTP client/server library widely used in Linux environments, including Red Hat Enterprise Linux 10. The flaw arises when libsoup clients encounter HTTP redirects (3xx responses). Instead of removing or restricting sensitive headers, libsoup mistakenly forwards the HTTP Authorization header to the new host specified in the redirect. This behavior violates the principle of least privilege and exposes sensitive authentication credentials to potentially untrusted or malicious hosts. The consequence is that the redirected host can impersonate the user to the original host, leveraging the leaked credentials to gain unauthorized access or perform actions on behalf of the user. The vulnerability affects confidentiality and integrity but does not impact availability. The CVSS 3.1 base score is 6.8 (medium), with vector AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N, indicating network attack vector, high attack complexity, no privileges required, user interaction needed, unchanged scope, and high impact on confidentiality and integrity. No known exploits have been reported in the wild yet. The vulnerability is particularly relevant for applications and services that rely on libsoup for HTTP communications and handle sensitive authentication tokens or credentials. The flaw can be exploited by tricking a user or client into following a malicious redirect, which then captures the Authorization header. This vulnerability underscores the importance of careful handling of HTTP headers during redirects and the risks of automatic forwarding of sensitive information.

Potential Impact

For European organizations, the impact of CVE-2025-46421 can be significant, especially for those using Red Hat Enterprise Linux 10 in environments where libsoup is employed for HTTP communications involving sensitive credentials. The unauthorized exposure of the Authorization header can lead to credential theft, unauthorized access to internal systems, and potential lateral movement within networks. This is particularly critical for sectors such as finance, healthcare, government, and critical infrastructure, where sensitive data and regulatory compliance are paramount. The flaw could facilitate targeted phishing or man-in-the-middle attacks that exploit redirects to capture credentials. Although the attack requires user interaction and has high attack complexity, the potential for impersonation and data breach elevates the risk. Organizations relying on automated HTTP clients or services that follow redirects without validation are especially vulnerable. The absence of known exploits in the wild provides a window for proactive mitigation, but the medium severity rating demands timely attention to prevent exploitation.

Mitigation Recommendations

1. Apply patches or updates from Red Hat or the libsoup project as soon as they become available to address this vulnerability. 2. Audit and modify application code that uses libsoup to handle HTTP redirects carefully, ensuring Authorization headers are not forwarded to untrusted or external hosts. 3. Implement strict validation of redirect URLs to allow only trusted domains or hosts, preventing redirection to malicious endpoints. 4. Use network-level controls such as web proxies or firewalls to monitor and restrict HTTP redirects and outgoing Authorization headers. 5. Educate users and administrators about the risks of following unexpected HTTP redirects, especially in sensitive environments. 6. Consider disabling automatic redirect following in libsoup-based clients where feasible, or configure them to strip sensitive headers on redirects. 7. Monitor logs and network traffic for unusual redirect patterns or unexpected Authorization header transmissions. 8. Incorporate this vulnerability into incident response plans to quickly detect and respond to potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-04-24T01:37:42.413Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb079

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 11/18/2025, 9:31:12 AM

Last updated: 11/22/2025, 2:58:21 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats