Mega-Fence (webgate-lib.*) 25.1.914 and prior trusts the first value of the X-Forwarded-For (XFF) header as the client IP without validating a trusted proxy chain. An attacker can supply an arbitrary XFF value in a remote request to spoof the client IP, which is then propagated to security-relevant state (e.g., WG_CLIENT_IP cookie). Deployments that rely on this value for IP allowlists may be bypassed.
Metrics
Affected Vendors & Products
References
History
Tue, 06 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 05 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-807 | |
| Metrics |
cvssV3_1
|
Mon, 05 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mega-Fence (webgate-lib.*) 25.1.914 and prior trusts the first value of the X-Forwarded-For (XFF) header as the client IP without validating a trusted proxy chain. An attacker can supply an arbitrary XFF value in a remote request to spoof the client IP, which is then propagated to security-relevant state (e.g., WG_CLIENT_IP cookie). Deployments that rely on this value for IP allowlists may be bypassed. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-05T21:08:06.488Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65328
Updated: 2026-01-05T21:03:06.165Z
Status : Received
Published: 2026-01-05T16:15:42.763
Modified: 2026-01-05T21:16:13.000
Link: CVE-2025-65328
No data.
OpenCVE Enrichment
No data.