AI description
CVE-2025-64484 is a header-smuggling vulnerability found in OAuth2-Proxy's handling of HTTP headers containing underscores. The proxy fails to properly normalize these header names, potentially allowing crafted requests to bypass header validation or filtering. This vulnerability affects deployments of OAuth2-Proxy in front of applications that treat underscores and hyphens differently in HTTP headers, such as WSGI frameworks like Django, Flask, FastAPI, or PHP apps. An authenticated attacker could exploit this to inject or manipulate upstream headers, potentially gaining unauthorized access to protected endpoints or sensitive information. OAuth2 Proxy authentication/authorization itself is not compromised. The issue has been patched in version 7.13.0.
- Description
- OAuth2-Proxy is an open-source tool that can act as either a standalone reverse proxy or a middleware component integrated into existing reverse proxy or load balancer setups. In versions prior to 7.13.0, all deployments of OAuth2 Proxy in front of applications that normalize underscores to dashes in HTTP headers (e.g., WSGI-based frameworks such as Django, Flask, FastAPI, and PHP applications). Authenticated users can inject underscore variants of X-Forwarded-* headers that bypass the proxy’s filtering logic, potentially escalating privileges in the upstream app. OAuth2 Proxy authentication/authorization itself is not compromised. The problem has been patched with v7.13.0. By default all specified headers will now be normalized, meaning that both capitalization and the use of underscores (_) versus dashes (-) will be ignored when matching headers to be stripped. For example, both `X-Forwarded-For` and `X_Forwarded-for` will now be treated as equivalent and stripped away. For those who have a rational that requires keeping a similar looking header and not stripping it, the maintainers introduced a new configuration field for Headers managed through the AlphaConfig called `InsecureSkipHeaderNormalization`. As a workaround, ensure filtering and processing logic in upstream services don't treat underscores and hyphens in Headers the same way.
- Source
- security-advisories@github.com
- NVD status
- Deferred
CVSS 3.1
- Type
- Secondary
- Base score
- 8.5
- Impact score
- 4.7
- Exploitability score
- 3.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
- Severity
- HIGH
- security-advisories@github.com
- CWE-644
- Hype score
- Not currently trending
TRC analysis shows attackers exploiting reverse proxy header manipulation vulnerabilities to bypass authentication and escalate privileges. CVE-2025-48865 (Fabio) and CVE-2025-64484 (OAuth2-Proxy) enable injection of crafted headers, leading to lateral movement within compromised
@aviatrixtrc
13 Mar 2026
125 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Two new CVEs. Two different proxies. One systemic flaw. 🔥CVE-2025-48865 (Fabio): Abuse the Connection header → strip X-Forwarded-For → backend's access control never triggers. 🔥CVE-2025-64484 (OAuth2-proxy): Send X_Forwarded_Email (underscore) → proxy misses it
@praetorianlabs
12 Mar 2026
985 Impressions
1 Retweet
7 Likes
6 Bookmarks
0 Replies
0 Quotes
CVE-2025-48865 and CVE-2025-64484 expose how HTTP header manipulation between reverse proxies and backend applications can enable authentication bypass and privilege escalation by exploiting hop-by-hop header stripping and header normalization inconsistencies.
@VivekIntel
12 Mar 2026
123 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Two new CVEs. Two different proxies. One systemic flaw. CVE-2025-48865 (Fabio): Abuse the Connection header → strip X-Forwarded-For → backend's access control never triggers. CVE-2025-64484 (OAuth2-proxy): Send X_Forwarded_Email (underscore) → proxy misses it → Django/F
@praetorianlabs
11 Mar 2026
1253 Impressions
3 Retweets
13 Likes
5 Bookmarks
3 Replies
0 Quotes
🚨🚨CVE-2025-64484: Proxy Underscore Header Smuggling Auth'd users inject X_Forwarded_* with underscores → bypass proxy → upstream WSGI/PHP normalizes to dashes and may grant elevated privileges. Search by vul.cve Filter👉vul.cve="CVE-2025-64484" ZoomEye https://t.co/l
@zoomeye_team
15 Nov 2025
2676 Impressions
5 Retweets
38 Likes
15 Bookmarks
0 Replies
0 Quotes
CVE-2025-64484 - Exploit and RCA for OAuth2-Proxy is vulnerable to header smuggling via underscore leading to potential privilege escalation #pruva ai repro platform report: https://t.co/8BivuV1KHr Advs: https://t.co/JAMk1OQBZu https://t.co/Kvjqf2KyrB
@N3mes1s
14 Nov 2025
2200 Impressions
7 Retweets
40 Likes
11 Bookmarks
0 Replies
0 Quotes
[CVE-2025-64484: HIGH] OAuth2-Proxy fixed a security issue in versions prior to 7.13.0 where underscore variants of X-Forwarded-* headers could be injected to bypass filtering logic, potentially escalating p...#cve,CVE-2025-64484,#cybersecurity https://t.co/7eSqwSVf9L https://t.c
@CveFindCom
10 Nov 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
**CVE-2025-64484** pertains to an issue in OAuth2-Proxy versions prior to 7.13.0, where the tool fails to normalize header names that contain underscores (`_`) versus hyphens (`-`). In environments that normalize or filter HTTP headers—particularly in reverse proxy or load
@CveTodo
10 Nov 2025
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-64484 OAuth2-Proxy is an open-source tool that can act as either a standalone reverse proxy or a middleware component integrated into existing reverse proxy or load balance… https://t.co/eagSiSCWDL
@CVEnew
10 Nov 2025
253 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes