Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-64484— OAuth2-Proxy vulnerable to header smuggling via underscore, leading to potential privilege escalation

CVSS 8.5 · High EPSS 0.04% · P13
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-64484

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
OAuth2-Proxy vulnerable to header smuggling via underscore, leading to potential privilege escalation
Source: NVD (National Vulnerability Database)
Vulnerability Description
OAuth2-Proxy is an open-source tool that can act as either a standalone reverse proxy or a middleware component integrated into existing reverse proxy or load balancer setups. In versions prior to 7.13.0, all deployments of OAuth2 Proxy in front of applications that normalize underscores to dashes in HTTP headers (e.g., WSGI-based frameworks such as Django, Flask, FastAPI, and PHP applications). Authenticated users can inject underscore variants of X-Forwarded-* headers that bypass the proxy’s filtering logic, potentially escalating privileges in the upstream app. OAuth2 Proxy authentication/authorization itself is not compromised. The problem has been patched with v7.13.0. By default all specified headers will now be normalized, meaning that both capitalization and the use of underscores (_) versus dashes (-) will be ignored when matching headers to be stripped. For example, both `X-Forwarded-For` and `X_Forwarded-for` will now be treated as equivalent and stripped away. For those who have a rational that requires keeping a similar looking header and not stripping it, the maintainers introduced a new configuration field for Headers managed through the AlphaConfig called `InsecureSkipHeaderNormalization`. As a workaround, ensure filtering and processing logic in upstream services don't treat underscores and hyphens in Headers the same way.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
对HTTP头部进行脚本语法转义处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
OAuth2-Proxy 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
oauth2-proxy是OAuth2 Proxy开源的一个反向代理软件。 OAuth2-Proxy 7.13.0之前版本存在安全漏洞,该漏洞源于HTTP标头处理不当,可能导致权限提升。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
oauth2-proxyoauth2-proxy < 7.13.0 -

II. Public POCs for CVE-2025-64484

#POC DescriptionSource LinkShenlong Link
1CVE-2025-64484https://github.com/B1ack4sh/Blackash-CVE-2025-64484POC Details
2CVE-2025-64484https://github.com/Ashwesker/Blackash-CVE-2025-64484POC Details
3CVE-2025-64484https://github.com/Ashwesker/Ashwesker-CVE-2025-64484POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-64484

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-64484

No comments yet


Leave a comment