CVE-2023-26125
golang-github-gin-gonic-gin: Improper Input Validation
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning. **Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.
A flaw was found in Gin-Gonic Gin. This flaw allows a remote attacker to bypass security restrictions caused by improper input validation. An attacker can perform cache poisoning attacks by sending a specially-crafted request using the X-Forwarded-Prefix header.
Red Hat OpenShift Container Platform release 4.13.54 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include a denial of service vulnerability.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-02-20 CVE Reserved
- 2023-05-04 CVE Published
- 2024-12-17 EPSS Updated
- 2025-01-29 CVE Updated
- 2025-01-29 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
- CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://github.com/gin-gonic/gin/releases/tag/v1.9.0 | Release Notes |
URL | Date | SRC |
---|---|---|
https://github.com/gin-gonic/gin/pull/3500 | 2025-01-29 | |
https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-3324285 | 2025-01-29 |
URL | Date | SRC |
---|---|---|
https://github.com/gin-gonic/gin/pull/3503 | 2023-11-07 | |
https://github.com/t0rchwo0d/gin/commit/fd9f98e70fb4107ee68c783482d231d35e60507b | 2023-11-07 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-26125 | 2024-11-06 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2203769 | 2024-11-06 |