Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4945: Integer Overflow or Wraparound

0
Low
VulnerabilityCVE-2025-4945cvecve-2025-4945
Published: Mon May 19 2025 (05/19/2025, 17:03:09 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in the cookie parsing logic of the libsoup HTTP library, used in GNOME applications and other software. The vulnerability arises when processing the expiration date of cookies, where a specially crafted value can trigger an integer overflow. This may result in undefined behavior, allowing an attacker to bypass cookie expiration logic, causing persistent or unintended cookie behavior. The issue stems from improper validation of large integer inputs during date arithmetic operations within the cookie parsing routines.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 01:45:35 UTC

Technical Analysis

CVE-2025-4945 identifies a vulnerability in the libsoup HTTP library's cookie parsing mechanism, specifically in how it processes the expiration date of cookies. Libsoup is widely used in GNOME applications and other software stacks for HTTP client functionality. The vulnerability arises from improper validation of large integer inputs during date arithmetic operations, leading to an integer overflow or wraparound. When a cookie's expiration date is set to a specially crafted large value, the integer overflow causes the expiration logic to malfunction, potentially allowing cookies to persist beyond their intended lifetime or behave unpredictably. This can undermine cookie-based session management or state control, possibly enabling attackers to maintain unauthorized sessions or bypass security controls relying on cookie expiration. The issue does not directly compromise confidentiality or availability but impacts the integrity of cookie handling. The vulnerability is remotely exploitable without authentication or user interaction, but the attack complexity is high due to the need for precise cookie crafting. The CVSS v3.1 score is 3.7 (low), reflecting limited impact and exploitation difficulty. The affected product is Red Hat Enterprise Linux 10, which bundles libsoup as part of its GNOME environment. No public exploits or active exploitation have been reported. The root cause is insufficient input validation and integer overflow handling in the date arithmetic code within libsoup's cookie parser. This vulnerability highlights the importance of robust input validation and secure arithmetic operations in security-critical libraries handling session and state data.

Potential Impact

The primary impact of CVE-2025-4945 is on the integrity of cookie expiration handling, potentially allowing attackers to bypass expiration checks and cause cookies to persist longer than intended. This can lead to unauthorized session persistence or state manipulation, which might facilitate session fixation or replay attacks in applications relying on cookie expiration for security. However, the vulnerability does not affect confidentiality or availability directly. The low CVSS score and lack of known exploits indicate a limited immediate threat. Organizations using GNOME applications or other software dependent on libsoup may face risks related to session management and authentication bypass if this flaw is exploited. The impact is more pronounced in environments where cookie expiration is critical for security controls, such as web-based authentication or access control systems. Since exploitation requires no authentication or user interaction, remote attackers can attempt to exploit this flaw by delivering crafted cookies, but the complexity of crafting such cookies reduces the likelihood of widespread exploitation. Overall, the impact is moderate but should not be ignored, especially in sensitive or high-security environments.

Mitigation Recommendations

To mitigate CVE-2025-4945, organizations should apply patches or updates from their Linux distribution vendors, particularly Red Hat, as soon as they become available to fix the integer overflow in libsoup's cookie parsing logic. Until patches are deployed, administrators can consider the following measures: 1) Implement strict input validation and filtering at the application or web server level to detect and block suspicious cookie values with unusually large expiration dates. 2) Monitor HTTP traffic for anomalous cookies that may indicate exploitation attempts. 3) Employ web application firewalls (WAFs) configured to detect and block malformed cookie headers. 4) Review and harden session management policies to reduce reliance solely on cookie expiration for session invalidation, such as implementing server-side session timeouts or token revocation mechanisms. 5) Educate developers and security teams about the risks of integer overflows in date handling and encourage secure coding practices. 6) Conduct security testing focused on cookie handling and expiration logic to identify similar weaknesses. These targeted mitigations help reduce the risk of exploitation while awaiting official patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-19T04:46:20.918Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb0d4

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 3/20/2026, 1:45:35 AM

Last updated: 3/22/2026, 9:50:08 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses