Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34475: CWE-180 Incorrect Behavior Order: Validate Before Canonicalize in varnish-software Varnish Cache

0
Medium
VulnerabilityCVE-2026-34475cvecve-2026-34475cwe-180
Published: Fri Mar 27 2026 (03/27/2026, 19:40:28 UTC)
Source: CVE Database V5
Vendor/Project: varnish-software
Product: Varnish Cache

Description

Varnish Cache before 8.0.1 and Varnish Enterprise before 6.0.16r12, in certain unchecked req.url scenarios, mishandle URLs with a path of / for HTTP/1.1, potentially leading to cache poisoning or authentication bypass.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 20:16:00 UTC

Technical Analysis

CVE-2026-34475 is a vulnerability identified in Varnish Cache, a widely used HTTP accelerator and caching reverse proxy. The issue stems from an incorrect behavior order related to the CWE-180 category: 'Validate Before Canonicalize.' In affected versions (prior to 8.0.1 for Varnish Cache and before 6.0.16r12 for Varnish Enterprise), the software mishandles URLs with a path of '/' in HTTP/1.1 requests when certain req.url scenarios are unchecked. This improper handling occurs because the system validates the URL before canonicalizing it, which can allow specially crafted requests to bypass intended validation checks. The consequence is that an attacker can potentially poison the cache by injecting malicious content or bypass authentication mechanisms that rely on URL validation. The vulnerability does not require privileges or user interaction but has a high attack complexity, meaning exploitation requires specific conditions or knowledge. The flaw primarily affects confidentiality and integrity by allowing unauthorized content injection or access bypass, but it does not impact availability. No public exploits have been reported yet, but the risk remains significant given Varnish Cache's role in accelerating web content delivery and protecting backend servers. The CVSS v3.1 score of 5.4 reflects a medium severity, balancing the potential impact with the complexity of exploitation.

Potential Impact

The vulnerability can lead to cache poisoning, where attackers inject malicious or unauthorized content into the cache, causing users to receive incorrect or harmful data. This undermines data integrity and can facilitate further attacks such as phishing or malware distribution. Additionally, the authentication bypass potential could allow unauthorized users to access protected resources, compromising confidentiality. For organizations relying on Varnish Cache to secure and accelerate web applications, this could result in data breaches, loss of user trust, and regulatory compliance violations. Since Varnish Cache is commonly used by large websites, CDNs, and cloud services, the scope of impact is broad. However, the high attack complexity reduces the likelihood of widespread exploitation. The absence of known exploits in the wild currently limits immediate risk but does not eliminate it. Failure to address this vulnerability could expose organizations to targeted attacks, especially those with high-value web assets.

Mitigation Recommendations

Organizations should upgrade Varnish Cache to version 8.0.1 or later and Varnish Enterprise to 6.0.16r12 or later, where this vulnerability is fixed. If immediate patching is not feasible, administrators should implement strict input validation and URL normalization at the web application firewall (WAF) or reverse proxy level to ensure URLs are properly canonicalized before validation. Monitoring and logging of unusual or malformed requests targeting the root path '/' should be enhanced to detect potential exploitation attempts. Additionally, review and tighten cache key generation logic to prevent unauthorized cache entries. Employ network segmentation and access controls to limit exposure of Varnish Cache instances to untrusted networks. Regularly audit and update security policies related to caching infrastructure. Finally, stay informed about any emerging exploits or patches related to this CVE.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-27T19:40:27.986Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c6e1b93c064ed76febd41d

Added to database: 3/27/2026, 7:59:53 PM

Last enriched: 3/27/2026, 8:16:00 PM

Last updated: 3/28/2026, 1:00:35 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses