Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 30 Jan 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mega-fence Project
Mega-fence Project mega-fence |
|
| CPEs | cpe:2.3:a:mega-fence_project:mega-fence:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mega-fence Project
Mega-fence Project mega-fence |
Tue, 06 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 05 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-807 | |
| Metrics |
cvssV3_1
|
Mon, 05 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mega-Fence (webgate-lib.*) 25.1.914 and prior trusts the first value of the X-Forwarded-For (XFF) header as the client IP without validating a trusted proxy chain. An attacker can supply an arbitrary XFF value in a remote request to spoof the client IP, which is then propagated to security-relevant state (e.g., WG_CLIENT_IP cookie). Deployments that rely on this value for IP allowlists may be bypassed. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-05T21:08:06.488Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65328
Updated: 2026-01-05T21:03:06.165Z
Status : Analyzed
Published: 2026-01-05T16:15:42.763
Modified: 2026-01-30T01:35:38.287
Link: CVE-2025-65328
No data.
OpenCVE Enrichment
No data.