CVE-2025-14523
Libsoup: libsoup: duplicate host header handling causes host-parsing discrepancy (first- vs last-value wins)
CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
0th
A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style attacks, cache poisoning, or bypassing host-based access controls when an attacker supplies duplicate Host headers.
| CWE | CWE-444 |
| Vendor | red hat |
| Product | red hat enterprise linux 10 |
| Published | Dec 11, 2025 |
| Last Updated | Mar 19, 2026 |
Stay Ahead of the Next One
Get instant alerts for red hat red hat enterprise linux 10
Be the first to know when new high vulnerabilities affecting red hat red hat enterprise linux 10 are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None
Affected Versions
Red Hat / Red Hat Enterprise Linux 10
All versions affected Red Hat / Red Hat Enterprise Linux 10.0 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
All versions affected Red Hat / Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 9.6 Extended Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 6
All versions affected References
access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0421 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0422 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0423 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0836 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0867 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0868 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0905 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0906 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0907 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0908 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0909 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0911 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0925 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:1509 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:1569 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:1570 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:1571 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:1572 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-14523 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2421349 gitlab.gnome.org: https://gitlab.gnome.org/GNOME/libsoup/-/issues/472
Credits
Red Hat would like to thank Ky0toFu and Sovereign Tech Resilience program for reporting this issue.