Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6gh2-xjvw-7rh4

Опубликовано: 05 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS3: 6.5

Описание

Mega-Fence (webgate-lib.*) 25.1.914 and prior trusts the first value of the X-Forwarded-For (XFF) header as the client IP without validating a trusted proxy chain. An attacker can supply an arbitrary XFF value in a remote request to spoof the client IP, which is then propagated to security-relevant state (e.g., WG_CLIENT_IP cookie). Deployments that rely on this value for IP allowlists may be bypassed.

Mega-Fence (webgate-lib.*) 25.1.914 and prior trusts the first value of the X-Forwarded-For (XFF) header as the client IP without validating a trusted proxy chain. An attacker can supply an arbitrary XFF value in a remote request to spoof the client IP, which is then propagated to security-relevant state (e.g., WG_CLIENT_IP cookie). Deployments that rely on this value for IP allowlists may be bypassed.

EPSS

Процентиль: 20%
0.00065
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-807

Связанные уязвимости

CVSS3: 6.5
nvd
около 1 месяца назад

Mega-Fence (webgate-lib.*) 25.1.914 and prior trusts the first value of the X-Forwarded-For (XFF) header as the client IP without validating a trusted proxy chain. An attacker can supply an arbitrary XFF value in a remote request to spoof the client IP, which is then propagated to security-relevant state (e.g., WG_CLIENT_IP cookie). Deployments that rely on this value for IP allowlists may be bypassed.

EPSS

Процентиль: 20%
0.00065
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-807