CVE-2025-64484
MinimOS vulnerability analysis and mitigation

Overview

A header-smuggling vulnerability (CVE-2025-64484) was discovered in OAuth2-Proxy's handling of HTTP headers containing underscores (_). The vulnerability affects versions up to and including 7.12.0 and was patched in version 7.13.0. The issue allows authenticated users to bypass header filtering logic by using underscore variants of X-Forwarded-* headers, potentially leading to privilege escalation in upstream applications (GitHub Advisory).

Technical details

The vulnerability stems from HTTP header normalization behavior where headers containing underscores are treated equivalently to their hyphenated variants. For example, both X-Forwarded-For and X_Forwarded_for would be normalized to the same header. This normalization occurs due to legacy CGI specifications where HTTP headers are converted to environment variables. The vulnerability specifically affects deployments where OAuth2-Proxy is placed in front of applications that normalize underscores to dashes in HTTP headers, such as WSGI-based frameworks (Django, Flask, FastAPI) and PHP applications (Telekom Security).

Impact

The vulnerability allows authenticated users to bypass header filtering mechanisms by injecting underscore variants of headers that would normally be stripped. This can lead to privilege escalation in upstream applications that rely on these headers for security decisions. While OAuth2-Proxy's own authentication and authorization mechanisms remain uncompromised, the header smuggling can affect security controls in the protected applications (GitHub Advisory).

Mitigation and workarounds

The issue has been patched in OAuth2-Proxy version 7.13.0, which introduces header normalization by default. The patch ensures that both capitalization and underscore/dash usage are normalized when matching headers to be stripped. For cases requiring preservation of similar headers, a new configuration field 'InsecureSkipHeaderNormalization' has been introduced. Additionally, organizations should ensure their upstream services don't treat underscores and hyphens in headers equivalently (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related MinimOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-21441HIGH8.9
  • PythonPython
  • barman
NoYesJan 07, 2026
CVE-2025-69262HIGH7.5
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-69263HIGH7.5
  • JavaScriptJavaScript
  • pnpm
NoYesJan 07, 2026
CVE-2025-68158MEDIUM5.7
  • PythonPython
  • airflow-3
NoYesJan 08, 2026
CVE-2025-61594LOW2.7
  • RubyRuby
  • rubygem-bigdecimal-debuginfo
NoYesDec 30, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management