CVE-2025-23167

NameCVE-2025-23167
DescriptionA flaw in Node.js 20's HTTP parser allows improper termination of HTTP/1 headers using `\r\n\rX` instead of the required `\r\n\r\n`. This inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests. The issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination. Impact: * This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs977716, 1105919

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-undici (PTS)bookworm5.15.0+dfsg1+~cs20.10.9.3-1+deb12u4vulnerable
bookworm (security)5.15.0+dfsg1+~cs20.10.9.3-1+deb12u3vulnerable
trixie7.3.0+dfsg1+~cs24.12.11-1vulnerable
sid7.3.0+dfsg1+~cs24.12.11-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
llhttpITP977716
node-undicisource(unstable)(unfixed)1105919

Notes

[bookworm] - node-undici <no-dsa> (Minor issue)
https://nodejs.org/en/blog/vulnerability/may-2025-security-releases#improper-http-header-block-termination-in-llhttp-cve-2025-23167---medium

Search for package or bug name: Reporting problems