Description
Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI.
This issue affects Fireware OS: from 12.0 up to and including 12.11.
Published: 2025-02-14
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-1528 Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI. This issue affects Fireware OS: from 12.0 up to and including 12.11.
History

Mon, 02 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Watchguard
Watchguard firebox M270
Watchguard firebox M290
Watchguard firebox M370
Watchguard firebox M390
Watchguard firebox M440
Watchguard firebox M4600
Watchguard firebox M470
Watchguard firebox M4800
Watchguard firebox M5600
Watchguard firebox M570
Watchguard firebox M5800
Watchguard firebox M590
Watchguard firebox M670
Watchguard firebox M690
Watchguard firebox Nv5
Watchguard firebox T15
Watchguard firebox T20
Watchguard firebox T25
Watchguard firebox T35
Watchguard firebox T40
Watchguard firebox T45
Watchguard firebox T55
Watchguard firebox T70
Watchguard firebox T80
Watchguard firebox T85
Watchguard fireboxcloud
Watchguard fireboxv
Watchguard fireware
CPEs cpe:2.3:h:watchguard:firebox_m270:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_m290:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_m370:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_m390:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_m440:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_m4600:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_m470:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_m4800:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_m5600:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_m570:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_m5800:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_m590:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_m670:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_m690:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_nv5:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_t15:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_t20:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_t25:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_t35:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_t40:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_t45:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_t55:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_t70:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_t80:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:firebox_t85:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:fireboxcloud:*:*:*:*:*:*:*:*
cpe:2.3:h:watchguard:fireboxv:*:*:*:*:*:*:*:*
cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*
Vendors & Products Watchguard
Watchguard firebox M270
Watchguard firebox M290
Watchguard firebox M370
Watchguard firebox M390
Watchguard firebox M440
Watchguard firebox M4600
Watchguard firebox M470
Watchguard firebox M4800
Watchguard firebox M5600
Watchguard firebox M570
Watchguard firebox M5800
Watchguard firebox M590
Watchguard firebox M670
Watchguard firebox M690
Watchguard firebox Nv5
Watchguard firebox T15
Watchguard firebox T20
Watchguard firebox T25
Watchguard firebox T35
Watchguard firebox T40
Watchguard firebox T45
Watchguard firebox T55
Watchguard firebox T70
Watchguard firebox T80
Watchguard firebox T85
Watchguard fireboxcloud
Watchguard fireboxv
Watchguard fireware
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00117}

epss

{'score': 0.0013}


Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00162}

epss

{'score': 0.00117}


Fri, 14 Feb 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 14 Feb 2025 13:30:00 +0000

Type Values Removed Values Added
Description Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI. This issue affects Fireware OS: from 12.0 up to and including 12.11.
Title WatchGaurd Firebox Host Header Injection Vulnerability
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Watchguard Firebox M270 Firebox M290 Firebox M370 Firebox M390 Firebox M440 Firebox M4600 Firebox M470 Firebox M4800 Firebox M5600 Firebox M570 Firebox M5800 Firebox M590 Firebox M670 Firebox M690 Firebox Nv5 Firebox T15 Firebox T20 Firebox T25 Firebox T35 Firebox T40 Firebox T45 Firebox T55 Firebox T70 Firebox T80 Firebox T85 Fireboxcloud Fireboxv Fireware
cve-icon MITRE

Status: PUBLISHED

Assigner: WatchGuard

Published:

Updated: 2025-02-14T14:01:35.532Z

Reserved: 2025-01-02T19:07:31.451Z

Link: CVE-2025-0178

cve-icon Vulnrichment

Updated: 2025-02-14T14:01:29.749Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-14T14:15:32.403

Modified: 2026-03-02T19:07:18.140

Link: CVE-2025-0178

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses