First published: Thu Apr 24 2025(Updated: )
A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libsoup | <3.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46421 has a moderate severity rating due to the potential for unauthorized user impersonation.
To fix CVE-2025-46421, update your libsoup to version 3.6.5 or later, which addresses this vulnerability.
CVE-2025-46421 affects the GNOME libsoup library versions prior to 3.6.5.
CVE-2025-46421 allows attackers to impersonate users by capturing their HTTP Authorization header during redirects.
CVE-2025-46421 was reported as a flaw in libsoup and is currently cataloged for public awareness.