CVE-2025-46421

A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
redhatCNA
6.8 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 16%
Debian logo
Debian Releases
Debian Product
Codename
libsoup2.4
bullseye
vulnerable
bullseye (security)
vulnerable
bookworm
vulnerable
sid
vulnerable
trixie
vulnerable
libsoup3
bookworm
vulnerable
sid
3.6.5-1
fixed
trixie
3.6.5-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libsoup2.4
plucky
Fixed 2.74.3-10ubuntu0.1
released
oracular
Fixed 2.74.3-7ubuntu0.3
released
noble
Fixed 2.74.3-6ubuntu1.3
released
jammy
Fixed 2.74.2-3ubuntu0.3
released
focal
Fixed 2.70.0-1ubuntu0.3
released
bionic
Fixed 2.62.1-1ubuntu0.4+esm2
released
xenial
Fixed 2.52.2-1ubuntu0.3+esm1
released
libsoup3
plucky
not-affected
oracular
Fixed 3.6.0-2ubuntu0.3
released
noble
Fixed 3.4.4-5ubuntu0.3
released
jammy
Fixed 3.0.7-0ubuntu1+esm3
released
focal
dne