Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-43634
PUBLISHED
More InfoOfficial Page
Assigner-VulnCheck
Assigner Org ID-83251b91-4cc7-4094-a5c7-464a1b83ea10
View Known Exploited Vulnerability (KEV) details
Published At-19 May, 2026 | 13:33
Updated At-19 May, 2026 | 16:39
Rejected At-
▼CVE Numbering Authority (CNA)
HestiaCP 1.2.0-1.9.4 IP Spoofing via CF-Connecting-IP Header

HestiaCP versions 1.2.0 through 1.9.4 contain an IP spoofing vulnerability that allows unauthenticated remote attackers to bypass authentication security controls by supplying an arbitrary IP address in the CF-Connecting-IP HTTP header without verifying the request originated from Cloudflare's network. Attackers can exploit this to circumvent fail2ban brute-force protection, bypass per-user IP allowlists, and poison authentication audit logs by spoofing trusted IP addresses on each request.

Affected Products
Vendor
hestiacp
Product
hestiacp
Repo
https://github.com/hestiacp/hestiacp
Default Status
affected
Versions
Affected
  • From 1.2.0 through 1.9.4 (semver)
Unaffected
  • f381e294500f671cf12716c638afd0bfde901f88 (git)
Problem Types
TypeCWE IDDescription
CWECWE-348Use of Less Trusted Source
Type: CWE
CWE ID: CWE-348
Description: Use of Less Trusted Source
Metrics
VersionBase scoreBase severityVector
4.08.7HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Version: 4.0
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

finder
sutol
remediation developer
divinity76
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://mercuryiss.com.au/hestiacp-unauthenticated-rce-ip-spoofing-cve-2026-43633-cve-2026-43634
technical-description
exploit
https://github.com/hestiacp/hestiacp/issues/5229
issue-tracking
https://github.com/hestiacp/hestiacp/pull/5273
issue-tracking
https://github.com/hestiacp/hestiacp/commit/f381e294500f671cf12716c638afd0bfde901f88
patch
https://www.vulncheck.com/advisories/hestiacp-ip-spoofing-via-cf-connecting-ip-header
third-party-advisory
Hyperlink: https://mercuryiss.com.au/hestiacp-unauthenticated-rce-ip-spoofing-cve-2026-43633-cve-2026-43634
Resource:
technical-description
exploit
Hyperlink: https://github.com/hestiacp/hestiacp/issues/5229
Resource:
issue-tracking
Hyperlink: https://github.com/hestiacp/hestiacp/pull/5273
Resource:
issue-tracking
Hyperlink: https://github.com/hestiacp/hestiacp/commit/f381e294500f671cf12716c638afd0bfde901f88
Resource:
patch
Hyperlink: https://www.vulncheck.com/advisories/hestiacp-ip-spoofing-via-cf-connecting-ip-header
Resource:
third-party-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found