CVE-2025-50578
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-30

Last updated on: 2025-08-25

Assigner: MITRE

Description
LinuxServer.io heimdall 2.6.3-ls307 contains a vulnerability in how it handles user-supplied HTTP headers, specifically `X-Forwarded-Host` and `Referer`. An unauthenticated remote attacker can manipulate these headers to perform Host Header Injection and Open Redirect attacks. This allows the loading of external resources from attacker-controlled domains and unintended redirection of users, potentially enabling phishing, UI redress, and session theft. The vulnerability exists due to insufficient validation and trust of untrusted input, affecting the integrity and trustworthiness of the application.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-30
Last Modified
2025-08-25
Generated
2026-05-07
AI Q&A
2025-07-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linuxserver docker-heimdall 2.6.3-ls307
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-74 The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-601 The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in LinuxServer.io heimdall 2.6.3-ls307 involves improper handling of user-supplied HTTP headers, specifically 'X-Forwarded-Host' and 'Referer'. An unauthenticated remote attacker can exploit this by manipulating these headers to perform Host Header Injection and Open Redirect attacks. This means the attacker can cause the application to load external resources from attacker-controlled domains or redirect users to unintended locations, potentially leading to phishing, UI redress attacks, and session theft.


How can this vulnerability impact me? :

The impact of this vulnerability includes the risk of phishing attacks, where users may be redirected to malicious sites; UI redress attacks that can trick users into interacting with malicious interfaces; and session theft, which can compromise user accounts and data. Overall, it affects the integrity and trustworthiness of the application, potentially leading to significant security breaches.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart