{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-12642","assignerOrgId":"1c6b5737-9389-4011-8117-89fa251edfb2","state":"PUBLISHED","assignerShortName":"Toreon","dateReserved":"2025-11-03T19:34:17.666Z","datePublished":"2025-11-03T19:36:17.011Z","dateUpdated":"2025-11-03T19:44:09.174Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["mod_proxy"],"packageName":"lighttpd1.4","product":"lighttpd","repo":"https://git.lighttpd.net/lighttpd/lighttpd1.4","vendor":"lighttpd","versions":[{"lessThan":"1.4.81","status":"affected","version":"1.4.80","versionType":"custom"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.81","versionStartIncluding":"1.4.80","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"OR"}],"credits":[{"lang":"en","type":"finder","value":"Sebastiano Sartor <@sebsrt>"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>lighttpd1.4.80 incorrectly merged trailer fields into headers&nbsp;after http request parsing. This behavior can be exploited to conduct HTTP Header Smuggling attacks.</p><p>Successful exploitation may allow an attacker to:</p><ul><li>Bypass access control rules</li><li>Inject unsafe input into backend logic that trusts request headers</li><li>Execute HTTP Request Smuggling attacks under some conditions</li></ul><p>This issue affects lighttpd1.4.80</p>"}],"value":"lighttpd1.4.80 incorrectly merged trailer fields into headers after http request parsing. This behavior can be exploited to conduct HTTP Header Smuggling attacks.\n\nSuccessful exploitation may allow an attacker to:\n\n  *  Bypass access control rules\n  *  Inject unsafe input into backend logic that trusts request headers\n  *  Execute HTTP Request Smuggling attacks under some conditions\n\n\nThis issue affects lighttpd1.4.80"}],"impacts":[{"capecId":"CAPEC-554","descriptions":[{"lang":"en","value":"CAPEC-554 Functionality Bypass"}]},{"capecId":"CAPEC-33","descriptions":[{"lang":"en","value":"CAPEC-33 HTTP Request Smuggling"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":6.9,"baseSeverity":"MEDIUM","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"LOW","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-444","description":"CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"1c6b5737-9389-4011-8117-89fa251edfb2","shortName":"Toreon","dateUpdated":"2025-11-03T19:36:17.011Z"},"references":[{"url":"https://github.com/lighttpd/lighttpd1.4/commit/35cb89c103877de62d6b63d0804255475d77e5e1"}],"source":{"discovery":"UNKNOWN"},"title":"HTTP Header Smuggling via Trailer Merge","x_generator":{"engine":"Vulnogram 0.4.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-03T19:43:55.914894Z","id":"CVE-2025-12642","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-03T19:44:09.174Z"}}]}}