Information Disclosure Vulnerability in Squid Caching Proxy
CVE-2025-62168
Key Information:
- Vendor
Squid-cache
- Status
- Vendor
- CVE Published:
- 17 October 2025
Badges
What is CVE-2025-62168?
CVE-2025-62168 is an information disclosure vulnerability affecting the Squid Caching Proxy, a widely used open-source proxy server designed to optimize web traffic through caching. This vulnerability arises from a failure to properly redact HTTP authentication credentials during error handling in versions prior to 7.2 of Squid. As a result, it enables potential remote attackers to access sensitive information, specifically authentication tokens and credentials utilized for verifying users in trusted client interactions. The implications are particularly severe for organizations using Squid in backend operations for load balancing, as the exposure of internal security credentials can be exploited to compromise web applications and their users. This weakness can be problematic for organizations that rely heavily on Squid for managing web requests, potentially undermining the integrity and confidentiality of their operations.
Potential impact of CVE-2025-62168
-
Unauthorized Access to Credentials: The vulnerability allows scripts to bypass security measures, potentially exposing security tokens or authentication credentials to unauthorized users. This can lead to malicious exploitation of internal services.
-
Increased Risk of Data Breaches: With the possibility of leaked credentials, an organization may face significant risks, including unauthorized access to critical data and systems, leading to data breaches that could have severe regulatory and financial repercussions.
-
Compromise of Web Application Integrity: Since Squid can be used for backend load balancing, access to its sensitive authentication mechanisms can lead to broader compromises within the web application's architecture, putting the entire framework at risk. Without adequate protections in place, such vulnerabilities can enable further attacks, including session hijacking and impersonation of trusted users.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
squid < 7.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
