Description
Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.
Published: 2025-03-12
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Proxy bypass leading to unintended direct connections
Action: Patch
AI Analysis

Impact

The vulnerability causes proxy matching logic in Go’s standard library and golang.org/x/net to incorrectly treat an IPv6 zone ID as part of the hostname. When the NO_PROXY environment variable is set to a pattern such as "*.example.com", a request to a URL like "[::1%25.example.com]:80" will be recognized as a match and therefore routed directly, bypassing the configured proxy. This flaw allows an attacker to force traffic that should be proxied to travel unfiltered, potentially exposing internal network details or bypassing authentication controls that are applied by the proxy.

Affected Systems

The issue affects applications that compile against the Go net/http standard library and the golang.org/x/net/http/httpproxy and golang.org/x/net/proxy packages. Systems running Red Hat OpenShift Data Foundation 4.18 on el9 (as identified by the cpe string) and other deployments that use these packages may be impacted. Specific version information was not supplied by the CNA, so any deployment using a vulnerable Go version should be evaluated.

Risk and Exploitability

With a CVSS score of 4.4 the vulnerability is considered moderate in severity, and an EPSS score of less than 1% indicates a very low probability of exploitation. The flaw is not listed in CISA’s KEV catalog, and no public exploit has been reported. The likely attack vector requires the attacker to supply or influence HTTP requests that include IPv6 addresses with zone identifiers, and the vulnerability is an input validation issue (CWE-115, CWE-20). Because the flaw resides in the client’s proxy selection logic, it is best exploited when the target application automatically processes untrusted traffic or is controlled by an external entity capable of manipulating the NO_PROXY environment variable. Overall risk is moderate but with low anticipated exploitation.

Generated by OpenCVE AI on April 20, 2026 at 15:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Go standard library and the golang.org/x/net packages to the most recent version that contains the fix for CVE‑2025‑22870.
  • Ensure that any NO_PROXY configuration is free of IPv6 zone identifiers or that the application sanitizes the request URLs before pattern matching.
  • If an immediate upgrade is not possible, enforce proxy usage at the network level or block direct access to internal services to prevent traffic from bypassing the proxy.

Generated by OpenCVE AI on April 20, 2026 at 15:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-6690 HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
Github GHSA Github GHSA GHSA-qxp5-gwg8-xv66 HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
Ubuntu USN Ubuntu USN USN-7574-1 Go vulnerabilities
History

Thu, 16 Apr 2026 22:45:00 +0000


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00012}

epss

{'score': 0.00014}


Thu, 15 May 2025 06:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat openshift Data Foundation
CPEs cpe:/a:redhat:openshift_data_foundation:4.18::el9
Vendors & Products Redhat
Redhat openshift Data Foundation

Fri, 09 May 2025 20:45:00 +0000

Type Values Removed Values Added
References

Tue, 18 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-115
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 14 Mar 2025 02:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L'}

threat_severity

Moderate


Wed, 12 Mar 2025 19:45:00 +0000

Type Values Removed Values Added
References

Wed, 12 Mar 2025 18:45:00 +0000

Type Values Removed Values Added
Description Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.
Title HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net
References

Subscriptions

Redhat Openshift Data Foundation
cve-icon MITRE

Status: PUBLISHED

Assigner: Go

Published:

Updated: 2026-04-16T22:39:33.619Z

Reserved: 2025-01-08T19:11:42.834Z

Link: CVE-2025-22870

cve-icon Vulnrichment

Updated: 2025-05-09T20:03:37.043Z

cve-icon NVD

Status : Deferred

Published: 2025-03-12T19:15:38.310

Modified: 2026-04-16T23:16:32.860

Link: CVE-2025-22870

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-03-12T18:27:59Z

Links: CVE-2025-22870 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T16:00:10Z

Weaknesses