Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
History

Sat, 18 Oct 2025 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Critical


Fri, 17 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 17 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
Description Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
Title Squid vulnerable to information disclosure via authentication credential leakage in error handling
Weaknesses CWE-209
CWE-550
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-10-18T03:55:46.046Z

Reserved: 2025-10-07T16:12:03.425Z

Link: CVE-2025-62168

cve-icon Vulnrichment

Updated: 2025-10-17T17:21:51.075Z

cve-icon NVD

Status : Received

Published: 2025-10-17T17:15:49.037

Modified: 2025-10-17T17:15:49.037

Link: CVE-2025-62168

cve-icon Redhat

Severity : Critical

Publid Date: 2025-10-17T16:21:30Z

Links: CVE-2025-62168 - Bugzilla

cve-icon OpenCVE Enrichment

No data.