First published: Fri Mar 21 2025(Updated: )
Varnish Cache before 7.6.2 and Varnish Enterprise before 6.0.13r10 allow client-side desync via HTTP/1 requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Varnish Enterprise | <7.6.2 | |
Varnish Enterprise | <6.0.13r10 | |
Varnish Cache | =6.0.11-r1 | |
Varnish Cache | =6.0.11-r2 | |
Varnish Cache | =6.0.11-r3 | |
Varnish Cache | =6.0.11-r4 | |
Varnish Cache | =6.0.11-r5 | |
Varnish Cache | =6.0.11-r6 | |
Varnish Cache | =6.0.11-r7 | |
Varnish Cache | =6.0.12-r1 | |
Varnish Cache | =6.0.12-r2 | |
Varnish Cache | =6.0.12-r3 | |
Varnish Cache | =6.0.12-r4 | |
Varnish Cache | =6.0.12-r5 | |
Varnish Cache | =6.0.12-r6 | |
Varnish Cache | =6.0.12-r7 | |
Varnish Cache | =6.0.12-r8 | |
Varnish Cache | =6.0.12-r9 | |
Varnish Cache | =6.0.13-r1 | |
Varnish Cache | =6.0.13-r2 | |
Varnish Cache | =6.0.13-r3 | |
Varnish Cache | =6.0.13-r4 | |
Varnish Cache | =6.0.13-r5 | |
Varnish Cache | =6.0.13-r6 | |
Varnish Cache | =6.0.13-r7 | |
Varnish Cache | =6.0.13-r8 | |
Varnish Cache | =6.0.13-r9 | |
Varnish Cache | <7.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-30346 is classified as high due to the potential for client-side desynchronization exploits.
To mitigate CVE-2025-30346, upgrade Varnish Cache to version 7.6.2 or later and Varnish Enterprise to version 6.0.13r10 or later.
CVE-2025-30346 affects Varnish Cache versions prior to 7.6.2 and Varnish Enterprise versions prior to 6.0.13r10.
CVE-2025-30346 allows for client-side desynchronization via specially crafted HTTP/1 requests.
Yes, CVE-2025-30346 can potentially be exploited remotely, making it a significant security concern.