CVE-2026-43634 PUBLISHED

HestiaCP 1.2.0-1.9.4 IP Spoofing via CF-Connecting-IP Header

Assigner: VulnCheck
Reserved: 01.05.2026 Published: 19.05.2026 Updated: 19.05.2026

HestiaCP versions 1.2.0 through 1.9.4 contain an IP spoofing vulnerability that allows unauthenticated remote attackers to bypass authentication security controls by supplying an arbitrary IP address in the CF-Connecting-IP HTTP header without verifying the request originated from Cloudflare's network. Attackers can exploit this to circumvent fail2ban brute-force protection, bypass per-user IP allowlists, and poison authentication audit logs by spoofing trusted IP addresses on each request.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor hestiacp
Product hestiacp
Versions Default: affected
  • affected from 1.2.0 to 1.9.4 (incl.)
  • Version f381e294500f671cf12716c638afd0bfde901f88 is unaffected

Credits

  • sutol finder
  • divinity76 remediation developer

References

Problem Types

  • Use of Less Trusted Source CWE