🔐 CVE Alert

CVE-2025-14523

HIGH 8.2

Libsoup: libsoup: duplicate host header handling causes host-parsing discrepancy (first- vs last-value wins)

CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
0th

A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style attacks, cache poisoning, or bypassing host-based access controls when an attacker supplies duplicate Host headers.

CWE CWE-444
Vendor red hat
Product red hat enterprise linux 10
Published Dec 11, 2025
Last Updated Mar 19, 2026
Stay Ahead of the Next One

Get instant alerts for red hat red hat enterprise linux 10

Be the first to know when new high vulnerabilities affecting red hat red hat enterprise linux 10 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
None

Affected Versions

Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 10.0 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 9.6 Extended Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected

References

NVD ↗ CVE.org ↗ EPSS Data ↗
access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0421 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0422 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0423 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0836 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0867 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0868 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0905 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0906 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0907 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0908 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0909 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0911 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0925 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:1509 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:1569 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:1570 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:1571 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:1572 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-14523 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2421349 gitlab.gnome.org: https://gitlab.gnome.org/GNOME/libsoup/-/issues/472

Credits

Red Hat would like to thank Ky0toFu and Sovereign Tech Resilience program for reporting this issue.