- Description
- Fabio is an HTTP(S) and TCP router for deploying applications managed by consul. Prior to version 1.6.6, Fabio allows clients to remove X-Forwarded headers (except X-Forwarded-For) due to a vulnerability in how it processes hop-by-hop headers. Fabio adds HTTP headers like X-Forwarded-Host and X-Forwarded-Port when routing requests to backend applications. Since the receiving application should trust these headers, allowing HTTP clients to remove or modify them creates potential security vulnerabilities. Some of these custom headers can be removed and, in certain cases, manipulated. The attack relies on the behavior that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been patched in version 1.6.6.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
- Products
- fabio
CVSS 3.1
- Type
- Primary
- Base score
- 9.1
- Impact score
- 5.2
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
- Severity
- CRITICAL
- Hype score
- Not currently trending
TRC analysis shows attackers exploiting reverse proxy header manipulation vulnerabilities to bypass authentication and escalate privileges. CVE-2025-48865 (Fabio) and CVE-2025-64484 (OAuth2-Proxy) enable injection of crafted headers, leading to lateral movement within compromised
@aviatrixtrc
13 Mar 2026
125 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Two new CVEs. Two different proxies. One systemic flaw. 🔥CVE-2025-48865 (Fabio): Abuse the Connection header → strip X-Forwarded-For → backend's access control never triggers. 🔥CVE-2025-64484 (OAuth2-proxy): Send X_Forwarded_Email (underscore) → proxy misses it
@praetorianlabs
12 Mar 2026
985 Impressions
1 Retweet
7 Likes
6 Bookmarks
0 Replies
0 Quotes
CVE-2025-48865 and CVE-2025-64484 expose how HTTP header manipulation between reverse proxies and backend applications can enable authentication bypass and privilege escalation by exploiting hop-by-hop header stripping and header normalization inconsistencies.
@VivekIntel
12 Mar 2026
123 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Two new CVEs. Two different proxies. One systemic flaw. CVE-2025-48865 (Fabio): Abuse the Connection header → strip X-Forwarded-For → backend's access control never triggers. CVE-2025-64484 (OAuth2-proxy): Send X_Forwarded_Email (underscore) → proxy misses it → Django/F
@praetorianlabs
11 Mar 2026
1253 Impressions
3 Retweets
13 Likes
5 Bookmarks
3 Replies
0 Quotes
CVE-2025-48865 Header Manipulation Vulnerability in Fabio Router Versions Prior to 1.6.6 https://t.co/L1624LSu0J
@VulmonFeeds
30 May 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️ Critical vuln in fabiolb/fabio (CVE-2025-48865): Insufficient header verification enables header removal/manipulation. Patch to 1.6.6 now! Details: https://t.co/6GqBxlAAJN #OffSeq #CVE202548865 #cybersecurity https://t.co/gy99aoLyll
@offseq
30 May 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-48865 Fabio is an HTTP(S) and TCP router for deploying applications managed by consul. Prior to version 1.6.6, Fabio allows clients to remove X-Forwarded headers (except X-… https://t.co/mXjUtRRvwv
@CVEnew
30 May 2025
380 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-48865: CRITICAL] Fabio, an HTTP(S) and TCP router managed by Consul, had a vulnerability allowing clients to remove critical X-Forwarded headers, posing potential security risks. Update to version ...#cve,CVE-2025-48865,#cybersecurity https://t.co/6qsALMwXvG https://t.c
@CveFindCom
30 May 2025
81 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fabiolb:fabio:*:*:*:*:*:go:*:*",
"matchCriteriaId": "6A945EFC-B582-43E7-A382-9EE8DFF03511",
"versionEndExcluding": "1.6.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]