| Name | CVE-2026-43505 |
| Description | An issue was discovered in Prosody before 0.12.6 and 1.0.0 through 13.0.0 before 13.0.5, when mod_proxy65 is enabled. Because mod_proxy65 mishandles access control in the activation scenario, relaying of unauthenticated traffic can occur. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DSA-6252-1 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| prosody (PTS) | bullseye (security), bullseye | 0.11.9-2+deb11u2 | vulnerable |
| bookworm | 0.12.3-1 | vulnerable | |
| bookworm (security) | 0.12.3-1+deb12u1 | fixed | |
| trixie | 13.0.1-1 | vulnerable | |
| trixie (security) | 13.0.1-1+deb131u | fixed | |
| forky, sid | 13.0.5-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| prosody | source | bookworm | 0.12.3-1+deb12u1 | DSA-6252-1 | ||
| prosody | source | trixie | 13.0.1-1+deb131u | DSA-6252-1 | ||
| prosody | source | (unstable) | 13.0.5-1 |
https://prosody.im/security/advisory_735dd9d3/
https://hg.prosody.im/trunk/rev/f34ad235cf3b