Alpaquita LinuxStreamSecurity Advisory
Search Cve

CVE-2025-23167

Published: May 20, 2025Last modified: July 20, 2025

Description

A flaw in Node.js 20's HTTP parser allows improper termination of HTTP/1 headers using `\r\n\rX` instead of the required `\r\n\r\n`. This inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests. The issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination. Impact: * This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade.

Severity score breakdown

ParameterValue
Base score6.5
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityLOW
Integrity impactLOW
Availability impactNONE
VectorCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Status

ProductReleasePackageStatus
Alpaquita LinuxStreamnodejsFixed (22.11.0-r0)
Liberica NIK23 (JDK 17)coreFixed (23.0.9+1)
standard (nodejs)Fixed (23.0.9+1)
23 (JDK 21)coreFixed (23.1.8+1)
standard (nodejs)Fixed (23.1.8+1)
24 (JDK 24)nodejsFixed (24.2.2+1)

References

Published BELL-SAs

ON THIS PAGE