IP Spoofing Vulnerability in HestiaCP Affects Multiple Versions
CVE-2026-43634
Key Information:
Badges
What is CVE-2026-43634?
HestiaCP versions 1.2.0 through 1.9.4 exhibit an IP spoofing vulnerability that permits unauthenticated remote attackers to evade authentication controls. By injecting a falsified IP address into the CF-Connecting-IP HTTP header, attackers can manipulate the system into trusting their requests as legitimate. This exploitation allows bypassing of fail2ban brute-force protections, negating individual IP allowlists, and poisoning authentication audit logs with trusted addresses, potentially leading to significant unauthorized access and control over the affected systems.
Affected Version(s)
hestiacp 1.2.0 <= 1.9.4
hestiacp 1.2.0 <= 1.9.4
hestiacp f381e294500f671cf12716c638afd0bfde901f88
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
