icon

We found results for “

CVE-2025-64484

Good to know:

icon
icon

Date: November 10, 2025

OAuth2-Proxy is an open-source tool that can act as either a standalone reverse proxy or a middleware component integrated into existing reverse proxy or load balancer setups. In versions prior to 7.13.0, all deployments of OAuth2 Proxy in front of applications that normalize underscores to dashes in HTTP headers (e.g., WSGI-based frameworks such as Django, Flask, FastAPI, and PHP applications). Authenticated users can inject underscore variants of X-Forwarded-* headers that bypass the proxy’s filtering logic, potentially escalating privileges in the upstream app. OAuth2 Proxy authentication/authorization itself is not compromised. The problem has been patched with v7.13.0. By default all specified headers will now be normalized, meaning that both capitalization and the use of underscores (_) versus dashes (-) will be ignored when matching headers to be stripped. For example, both "X-Forwarded-For" and "X_Forwarded-for" will now be treated as equivalent and stripped away. For those who have a rational that requires keeping a similar looking header and not stripping it, the maintainers introduced a new configuration field for Headers managed through the AlphaConfig called "InsecureSkipHeaderNormalization". As a workaround, ensure filtering and processing logic in upstream services don't treat underscores and hyphens in Headers the same way.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of HTTP Headers for Scripting Syntax

CWE-644

Top Fix

icon

Upgrade Version

Upgrade to version github.com/oauth2-proxy/oauth2-proxy - v7.13.0;github.com/oauth2-proxy/oauth2-proxy/v7 - v7.13.0

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us