Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2025-64484

OAuth2-Proxy vulnerable to header smuggling via underscore, leading to potential privilege escalation
Back to all
CVE

CVE-2025-64484

OAuth2-Proxy vulnerable to header smuggling via underscore, leading to potential privilege escalation

OAuth2-Proxy is an open-source tool that can act as either a standalone reverse proxy or a middleware component integrated into existing reverse proxy or load balancer setups. In versions prior to 7.13.0, all deployments of OAuth2 Proxy in front of applications that normalize underscores to dashes in HTTP headers (e.g., WSGI-based frameworks such as Django, Flask, FastAPI, and PHP applications). Authenticated users can inject underscore variants of X-Forwarded-* headers that bypass the proxy’s filtering logic, potentially escalating privileges in the upstream app. OAuth2 Proxy authentication/authorization itself is not compromised. The problem has been patched with v7.13.0. By default all specified headers will now be normalized, meaning that both capitalization and the use of underscores (_) versus dashes (-) will be ignored when matching headers to be stripped. For example, both X-Forwarded-For and X_Forwarded-for will now be treated as equivalent and stripped away. For those who have a rational that requires keeping a similar looking header and not stripping it, the maintainers introduced a new configuration field for Headers managed through the AlphaConfig called InsecureSkipHeaderNormalization. As a workaround, ensure filtering and processing logic in upstream services don't treat underscores and hyphens in Headers the same way.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
8.5
-
3.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
C
H
U
0
-
3.1
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
C
H
U
-

Related Resources

No items found.

References

https://datatracker.ietf.org/doc/html/rfc2616#section-4.2, https://datatracker.ietf.org/doc/html/rfc822#section-3.2, https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64484.json, https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-vjrc-mh2v-45x6, https://github.security.telekom.com/2020/05/smuggling-http-headers-through-reverse-proxies.html, https://nvd.nist.gov/vuln/detail/CVE-2025-64484, https://www.uptimia.com/questions/why-are-http-headers-with-underscores-dropped-by-nginx

Severity

8.5

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
8.5
EPSS Probability
0.00034%
EPSS Percentile
0.09554%
Introduced Version
0
Fix Available
082b49aaeb656fea23ad9accdc5a4be9218bb0d4

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading