Varnish-Cache Varnish vulnerabilities
18 known vulnerabilities affecting varnish-cache/varnish.
Total CVEs
18
CISA KEV
1
actively exploited
Public exploits
2
Exploited in wild
1
Severity breakdown
CRITICAL2HIGH12MEDIUM4
Vulnerabilities
Page 1 of 1
CVE-2025-8671HIGHCVSS 7.5≥ 0, < 7.7.2-12025-08-13
CVE-2025-8671 [HIGH] CVE-2025-8671: A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementa
A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset th
osv
CVE-2025-47905MEDIUMCVSS 5.4≥ 0, < 6.5.1-1+deb11u5≥ 0, < 7.1.1-2+deb12u1+1 more2025-05-13
CVE-2025-47905 [MEDIUM] CVE-2025-47905: Varnish Cache before 7
Varnish Cache before 7.6.3 and 7.7 before 7.7.1, and Varnish Enterprise before 6.0.13r14, allow client-side desync via HTTP/1 requests, because the product incorrectly permits CRLF to be skipped to delimit chunk boundaries.
osv
CVE-2025-30346MEDIUMCVSS 4.8≥ 0, < 6.5.1-1+deb11u4≥ 0, < 7.1.1-2+deb12u1+1 more2025-03-21
CVE-2025-30346 [MEDIUM] CVE-2025-30346: Varnish Cache before 7
Varnish Cache before 7.6.2 and Varnish Enterprise before 6.0.13r10 allow client-side desync via HTTP/1 requests.
osv
CVE-2024-30156HIGHCVSS 7.5≥ 0, < 7.5.0-12024-03-24
CVE-2024-30156 [HIGH] CVE-2024-30156: Varnish Cache before 7
Varnish Cache before 7.3.2 and 7.4.x before 7.4.3 (and before 6.0.13 LTS), and Varnish Enterprise 6 before 6.0.12r6, allows credits exhaustion for an HTTP/2 connection control flow window, aka a Broke Window Attack.
osv
CVE-2023-44487HIGHCVSS 7.5KEVPoC≥ 0, < 7.5.0-12023-10-10
CVE-2023-44487 [HIGH] CVE-2023-44487: The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
osv
CVE-2022-45060HIGHCVSS 7.5≥ 0, < 6.5.1-1+deb11u3≥ 0, < 7.1.1-1.12022-11-09
CVE-2022-45060 [HIGH] CVE-2022-45060: An HTTP Request Forgery issue was discovered in Varnish Cache 5
An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a se
osv
CVE-2022-45059HIGHCVSS 7.5≥ 0, < 7.1.1-1.12022-11-09
CVE-2022-45059 [HIGH] CVE-2022-45059: An issue was discovered in Varnish Cache 7
An issue was discovered in Varnish Cache 7.x before 7.1.2 and 7.2.x before 7.2.1. A request smuggling attack can be performed on Varnish Cache servers by requesting that certain headers are made hop-by-hop, preventing the Varnish Cache servers from forwarding critical headers to the backend.
osv
CVE-2020-11653HIGHCVSS 7.5≥ 0, < 6.2.1-2ubuntu0.22022-08-23
CVE-2020-11653 [HIGH] varnish regression
varnish regression
USN-5474-1 fixed vulnerabilities in Varnish Cache. Unfortunately the fix for
CVE-2020-11653 was incomplete. This update fixes the problem.
Original advisory details:
It was discovered that Varnish Cache could have an assertion failure when a
TLS termination proxy uses PROXY version 2. A remote attacker could possibly
use this issue to restart the daemon and cause a performance loss.
(CVE-2020-11653)
osv
CVE-2022-38150HIGHCVSS 7.5≥ 0, < 7.1.1-12022-08-11
CVE-2022-38150 [HIGH] CVE-2022-38150: In Varnish Cache 7
In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1.
osv
CVE-2019-20637HIGHCVSS 7.5≥ 0, < 5.2.1-1ubuntu0.1≥ 0, < 6.2.1-2ubuntu0.1+1 more2022-06-08
CVE-2019-20637 [HIGH] varnish vulnerabilities
varnish vulnerabilities
It was dicovered that Varnish Cache did not clear a pointer between the
handling of one client request and the next request within the same connection.
A remote attacker could possibly use this issue to obtain sensitive
information. (CVE-2019-20637)
It was discovered that Varnish Cache could have an assertion failure when a
TLS termination proxy uses PROXY version 2. A remote attacker could possibly
use this issue to restart
osv
CVE-2022-23959CRITICALCVSS 9.1≥ 0, < 6.5.1-1+deb11u2≥ 0, < 7.1.0-52022-01-26
CVE-2022-23959 [CRITICAL] CVE-2022-23959: In Varnish Cache before 6
In Varnish Cache before 6.6.2 and 7.x before 7.0.2, Varnish Cache 6.0 LTS before 6.0.10, and and Varnish Enterprise (Cache Plus) 4.1.x before 4.1.11r6 and 6.0.x before 6.0.9r4, request smuggling can occur for HTTP/1 connections.
osv
CVE-2021-36740MEDIUMCVSS 6.5≥ 0, < 6.5.1-1+deb11u2≥ 0, < 6.5.2-12021-07-14
CVE-2021-36740 [MEDIUM] CVE-2021-36740: Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request
Varnish Cache, with HTTP/2 enabled, allows request smuggling and VCL authorization bypass via a large Content-Length header for a POST request. This affects Varnish Enterprise 6.0.x before 6.0.8r3, and Varnish Cache 5.x and 6.x before 6.5.2, 6.6.x before 6.6.1, and 6.0 LTS before 6.0.8.
osv
CVE-2019-15892HIGHCVSS 7.5≥ 0, < 6.2.1-12019-09-03
CVE-2019-15892 [HIGH] CVE-2019-15892: An issue was discovered in Varnish Cache before 6
An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack.
osv
CVE-2017-8807CRITICALCVSS 9.1≥ 4.1.0, < 4.1.92017-11-16
CVE-2017-8807 [CRITICAL] CWE-119 CVE-2017-8807: vbf_stp_error in bin/varnishd/cache/cache_fetch.c in Varnish HTTP Cache 4.1.x before 4.1.9 and 5.x b
vbf_stp_error in bin/varnishd/cache/cache_fetch.c in Varnish HTTP Cache 4.1.x before 4.1.9 and 5.x before 5.2.1 allows remote attackers to obtain sensitive information from process memory because a VFP_GetStorage buffer is larger than intended in certain circumstances involving -sfile Stevedore transient objects.
nvdosv
CVE-2017-12425HIGHCVSS 7.5v4.0.2v4.0.3+1 more2017-08-04
CVE-2017-12425 [HIGH] CWE-190 CVE-2017-12425: An issue was discovered in Varnish HTTP Cache 4.0.1 through 4.0.4, 4.1.0 through 4.1.7, 5.0.0, and 5
An issue was discovered in Varnish HTTP Cache 4.0.1 through 4.0.4, 4.1.0 through 4.1.7, 5.0.0, and 5.1.0 through 5.1.2. A wrong if statement in the varnishd source code means that particular invalid requests from the client can trigger an assert, related to an Integer Overflow. This causes the varnishd worker process to abort and restart, losing the c
nvdosv
CVE-2015-8852HIGHCVSS 7.5≥ 0, < 4.0.0-12016-04-25
CVE-2015-8852 [HIGH] CVE-2015-8852: Varnish 3
Varnish 3.x before 3.0.7, when used in certain stacked installations, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content-Length headers in an HTTP request.
osv
CVE-2013-4484MEDIUMCVSS 5.0v2.0.02013-11-01
CVE-2013-4484 [MEDIUM] CWE-119 CVE-2013-4484: Varnish before 3.0.5 allows remote attackers to cause a denial of service (child-process crash and t
Varnish before 3.0.5 allows remote attackers to cause a denial of service (child-process crash and temporary caching outage) via a GET request with trailing whitespace characters and no URI.
nvdosv
CVE-2009-2936HIGHCVSS 7.5PoC≥ 0, < 2.1.0-22010-04-05
CVE-2009-2936 [HIGH] CVE-2009-2936: The Command Line Interface (aka Server CLI or administration interface) in the master process in the reverse proxy server in Varnish before 2
The Command Line Interface (aka Server CLI or administration interface) in the master process in the reverse proxy server in Varnish before 2.1.0 does not require authentication for commands received through a TCP port, which allows remote attackers to (1) execute arbitrary code via a vcl.inline directive that provides a
osv