Description
frp is a fast reverse proxy. From 0.43.0 to 0.68.0, frp contains an authentication bypass in the HTTP vhost routing path when routeByHTTPUser is used as part of access control. In proxy-style requests, the routing logic uses the username from Proxy-Authorization to select the routeByHTTPUser backend, while the access control check uses credentials from the regular Authorization header. As a result, an attacker who can reach the HTTP vhost entrypoint and knows or can guess the protected routeByHTTPUser value may access a backend protected by httpUser / httpPassword even with an incorrect Proxy-Authorization password. This issue affects deployments that explicitly use routeByHTTPUser. It does not affect ordinary HTTP proxies that do not use this feature. This vulnerability is fixed in 0.68.1.
Published: 2026-04-21
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

frp, a fast reverse proxy, contains an authentication bypass in its HTTP vhost routing when the routeByHTTPUser feature is enabled. The routing logic selects the backend based on the username supplied in the Proxy-Authorization header, while the access control check verifies credentials from the normal Authorization header. Consequently, an attacker who can reach the HTTP vhost entry point and knows or can guess the protected routeByHTTPUser value may access a backend that is protected by httpUser/httpPassword even with an incorrect Proxy-Authorization password, effectively bypassing authentication. This flaw is a core authentication bypass (CWE‑287) and compromises the confidentiality of services behind the proxy. The vulnerability requires the attacker to be able to reach the HTTP vhost end‑point; based on the description, remote network access is sufficient. The description does not indicate the need for elevated privileges, so exploitation can be performed without local access.

Affected Systems

The affected product is fatedier:frp. Versions 0.43.0 through 0.68.0 are vulnerable when the routeByHTTPUser option is enabled. Ordinary HTTP proxies that do not use this feature are not impacted.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate impact; the EPSS score < 1% indicates a very low but non‑zero exploitation probability, and the flaw is not listed in the CISA KEV catalog. The vulnerability can be exploited by remote attackers with network access to the frp server, who can craft HTTP requests targeting the vhost entry point and use a guessed or known routeByHTTPUser value to access protected backends without the correct Proxy-Authorization credentials. No host‑level privileges or local access are required for exploitation, making the threat relevant to any remote attacker that can reach the server.

Generated by OpenCVE AI on May 1, 2026 at 05:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade frp to version 0.68.1 or later, where the authentication bypass is fixed.
  • If an upgrade cannot occur immediately, disable the routeByHTTPUser feature or restrict HTTP vhost access to trusted networks to prevent unauthenticated access.
  • Review and adjust your proxy configuration to ensure that Proxy-Authorization tokens are not used for routing when authentication is required, and verify that the Authorization header is properly validated by the backend service.

Generated by OpenCVE AI on May 1, 2026 at 05:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-pq96-pwvg-vrr9 frp has an authentication bypass in HTTP vhost routing when routeByHTTPUser is used for access control
History

Wed, 29 Apr 2026 23:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:fatedier:frp:*:*:*:*:*:*:*:*

Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Fatedier
Fatedier frp
Vendors & Products Fatedier
Fatedier frp

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description frp is a fast reverse proxy. From 0.43.0 to 0.68.0, frp contains an authentication bypass in the HTTP vhost routing path when routeByHTTPUser is used as part of access control. In proxy-style requests, the routing logic uses the username from Proxy-Authorization to select the routeByHTTPUser backend, while the access control check uses credentials from the regular Authorization header. As a result, an attacker who can reach the HTTP vhost entrypoint and knows or can guess the protected routeByHTTPUser value may access a backend protected by httpUser / httpPassword even with an incorrect Proxy-Authorization password. This issue affects deployments that explicitly use routeByHTTPUser. It does not affect ordinary HTTP proxies that do not use this feature. This vulnerability is fixed in 0.68.1.
Title frp: Authentication bypass in frp HTTP vhost routing when routeByHTTPUser is used for access control
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-21T20:28:48.579Z

Reserved: 2026-04-15T16:37:22.767Z

Link: CVE-2026-40910

cve-icon Vulnrichment

Updated: 2026-04-21T20:28:37.740Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-21T21:16:45.157

Modified: 2026-04-29T23:20:37.177

Link: CVE-2026-40910

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T05:45:10Z

Weaknesses