CVE-2025-9901
Linux Debian vulnerability analysis and mitigation

Overview

A flaw was found in libsoup's caching mechanism, SoupCache, where the HTTP Vary header is ignored when evaluating cached responses. This vulnerability, identified as CVE-2025-9901, affects the SoupCache implementation of the libsoup HTTP library. The issue was disclosed on September 3, 2025, and impacts systems where libsoup's caching functionality is explicitly enabled (NVD, Red Hat Bugzilla).

Technical details

The vulnerability stems from an implementation flaw in the soupcachehas_response() function where the HTTP Vary header validation is not properly implemented. This header is designed to ensure that responses vary appropriately based on request headers such as language or authentication. The vulnerability has been assigned CWE-524 (Use of Cache Containing Sensitive Information) and has received a CVSS v3.1 base score of 5.9 (Medium) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N (NVD).

Impact

The vulnerability can lead to cached content being incorrectly reused across different requests, potentially exposing sensitive user information. While the issue is unlikely to affect everyday desktop use, it could result in significant confidentiality breaches in proxy or multi-user environments. The primary risk is the potential disclosure of highly sensitive or user-specific content to unintended recipients (Red Hat Bugzilla).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management