CVE-2025-58068
BaseFortify
Publication date: 2025-08-29
Last updated on: 2025-11-03
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| eventlet | eventlet | to 0.40.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-444 | The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed by those entities that are at the ultimate destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Eventlet Python library's WSGI parser before version 0.40.3. It is an HTTP Request Smuggling issue caused by improper handling of HTTP trailer sections. Attackers can exploit this flaw to bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. The vulnerability was fixed in version 0.40.3 by dropping trailers, which may break functionality if the backend requires trailers.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow attackers to bypass security controls on the front end, potentially leading to unauthorized access or manipulation of web traffic. Attackers could target active users with specific attacks or poison web caches, which may result in serving malicious or incorrect content to users.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade Eventlet to version 0.40.3 or later where the issue is patched by dropping HTTP trailers. If upgrading is not immediately possible, avoid using eventlet.wsgi facing untrusted clients as a workaround.