CVE-2025-54574
Squid vulnerability analysis and mitigation

Overview

CVE-2025-54574 affects Squid, a caching proxy for the Web. The vulnerability was discovered in versions 6.3 and below, where Squid is susceptible to a heap buffer overflow and potential remote code execution when processing URN (Uniform Resource Name) due to incorrect buffer management. The issue was disclosed on July 31, 2025, and has been fixed in version 6.4. The vulnerability received a CVSS v3.1 score of 9.3 (Critical) (GitHub Advisory, NVD).

Technical details

The vulnerability stems from incorrect buffer management when processing URN Trivial-HTTP responses. The heap buffer overflow condition occurs during URN processing, potentially allowing delivery of up to 4KB of Squid allocated heap memory to the client. The vulnerability affects multiple versions including Squid-4.x up to 4.17, Squid-5.x up to 5.9, and Squid-6.x up to 6.3. Squid versions older than 4.14 should be assumed vulnerable. The issue has been classified as CWE-122 (Heap-based Buffer Overflow) (GitHub Advisory).

Impact

The vulnerability can lead to remote code execution and data leakage. When exploited, the buffer overflow attack could result in the exposure of up to 4KB of Squid allocated heap memory to the client, potentially revealing security credentials or other confidential data (Security Online, GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Squid version 6.4. For users unable to update immediately, a workaround is available by disabling URN access permissions through adding the following ACL rule to the Squid configuration: 'acl URN proto URN' followed by 'http_access deny URN'. Patches addressing this issue for stable releases can be found in the patch archives, with Squid 6 patch identified as a27bf4b (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management