#VU125944 Information disclosure in Async-http-client

 

#VU125944 Information disclosure in Async-http-client

Published: April 14, 2026


Vulnerability identifier: #VU125944
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: N/A
CWE-ID: CWE-200
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Async-http-client
Software vendor:
Asynchttpclient Project

Description

The vulnerability allows a remote attacker to disclose sensitive information.

The vulnerability exists due to exposure of sensitive information in redirect handling when following cross-origin redirects. A remote attacker can control a redirect target to disclose sensitive information.

The issue can leak Authorization and Proxy-Authorization headers as well as Realm credentials, including during HTTPS-to-HTTP downgrades. Even when authorization stripping is enabled, plaintext Realm credentials may still be propagated and regenerated for Basic and Digest authentication schemes.


Remediation

Install security update from vendor's website.

External links