CVE-2025-48865

Published May 30, 2025

Last updated a year ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-48865 is a vulnerability found in Fabio, an HTTP(S) and TCP router used for deploying applications managed by Consul, affecting versions prior to 1.6.6. The flaw lies in how Fabio processes hop-by-hop headers within HTTP requests. An attacker can exploit this by manipulating the HTTP `Connection` header, designating specific `X-Forwarded` headers (such as `X-Forwarded-Host`, `X-Forwarded-Port`, `X-Forwarded-Proto`, `X-Real-Ip`, and `Forwarded`) as hop-by-hop. This manipulation causes Fabio to strip these headers from the request before forwarding it to the backend application. Backend applications typically rely on these `X-Forwarded` headers for various operations, including determining the origin of a request. The removal of these headers can lead to confusion regarding the true source of the request and may impact how backend applications handle access control. The vulnerability has been addressed in Fabio version 1.6.6, with the fix involving filtering the `Connection` header to prevent the unintended removal of protected headers.

Description
Fabio is an HTTP(S) and TCP router for deploying applications managed by consul. Prior to version 1.6.6, Fabio allows clients to remove X-Forwarded headers (except X-Forwarded-For) due to a vulnerability in how it processes hop-by-hop headers. Fabio adds HTTP headers like X-Forwarded-Host and X-Forwarded-Port when routing requests to backend applications. Since the receiving application should trust these headers, allowing HTTP clients to remove or modify them creates potential security vulnerabilities. Some of these custom headers can be removed and, in certain cases, manipulated. The attack relies on the behavior that headers can be defined as hop-by-hop via the HTTP Connection header. This issue has been patched in version 1.6.6.
Source
security-advisories@github.com
NVD status
Analyzed
Products
fabio

Risk scores

CVSS 3.1

Type
Primary
Base score
9.1
Impact score
5.2
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Severity
CRITICAL

Weaknesses

security-advisories@github.com
CWE-345
nvd@nist.gov
CWE-345

Social media

Hype score
Not currently trending
  1. TRC analysis shows attackers exploiting reverse proxy header manipulation vulnerabilities to bypass authentication and escalate privileges. CVE-2025-48865 (Fabio) and CVE-2025-64484 (OAuth2-Proxy) enable injection of crafted headers, leading to lateral movement within compromised

    @aviatrixtrc

    13 Mar 2026

    125 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. Two new CVEs. Two different proxies. One systemic flaw. 🔥CVE-2025-48865 (Fabio): Abuse the Connection header → strip X-Forwarded-For → backend's access control never triggers. 🔥CVE-2025-64484 (OAuth2-proxy): Send X_Forwarded_Email (underscore) → proxy misses it

    @praetorianlabs

    12 Mar 2026

    985 Impressions

    1 Retweet

    7 Likes

    6 Bookmarks

    0 Replies

    0 Quotes

  3. CVE-2025-48865 and CVE-2025-64484 expose how HTTP header manipulation between reverse proxies and backend applications can enable authentication bypass and privilege escalation by exploiting hop-by-hop header stripping and header normalization inconsistencies.

    @VivekIntel

    12 Mar 2026

    123 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. Two new CVEs. Two different proxies. One systemic flaw. CVE-2025-48865 (Fabio): Abuse the Connection header → strip X-Forwarded-For → backend's access control never triggers. CVE-2025-64484 (OAuth2-proxy): Send X_Forwarded_Email (underscore) → proxy misses it → Django/F

    @praetorianlabs

    11 Mar 2026

    1253 Impressions

    3 Retweets

    13 Likes

    5 Bookmarks

    3 Replies

    0 Quotes

  5. CVE-2025-48865 Header Manipulation Vulnerability in Fabio Router Versions Prior to 1.6.6 https://t.co/L1624LSu0J

    @VulmonFeeds

    30 May 2025

    9 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. ⚠️ Critical vuln in fabiolb/fabio (CVE-2025-48865): Insufficient header verification enables header removal/manipulation. Patch to 1.6.6 now! Details: https://t.co/6GqBxlAAJN #OffSeq #CVE202548865 #cybersecurity https://t.co/gy99aoLyll

    @offseq

    30 May 2025

    8 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. CVE-2025-48865 Fabio is an HTTP(S) and TCP router for deploying applications managed by consul. Prior to version 1.6.6, Fabio allows clients to remove X-Forwarded headers (except X-… https://t.co/mXjUtRRvwv

    @CVEnew

    30 May 2025

    380 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. [CVE-2025-48865: CRITICAL] Fabio, an HTTP(S) and TCP router managed by Consul, had a vulnerability allowing clients to remove critical X-Forwarded headers, posing potential security risks. Update to version ...#cve,CVE-2025-48865,#cybersecurity https://t.co/6qsALMwXvG https://t.c

    @CveFindCom

    30 May 2025

    81 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations