CVE Vulnerabilities

CVE-2025-13086

Improper Verification of Source of a Communication Channel

Published: Dec 03, 2025 | Modified: Jan 30, 2026
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.6.15 and 2.7_alpha1 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client

Weakness

The product establishes a communication channel to handle an incoming request that has been initiated by an actor, but it does not properly verify that the request is coming from the expected origin.

Affected Software

NameVendorStart VersionEnd Version
OpenvpnOpenvpn2.6.0 (including)2.6.16 (excluding)
OpenvpnOpenvpn2.7-alpha1 (including)2.7-alpha1 (including)
OpenvpnOpenvpn2.7-alpha2 (including)2.7-alpha2 (including)
OpenvpnOpenvpn2.7-alpha3 (including)2.7-alpha3 (including)
OpenvpnOpenvpn2.7-beta1 (including)2.7-beta1 (including)
OpenvpnOpenvpn2.7-beta2 (including)2.7-beta2 (including)
OpenvpnOpenvpn2.7-beta3 (including)2.7-beta3 (including)
OpenvpnOpenvpn2.7-rc1 (including)2.7-rc1 (including)
OpenvpnUbuntudevel*
OpenvpnUbuntunoble*
OpenvpnUbuntuplucky*
OpenvpnUbuntuquesting*
OpenvpnUbuntuupstream*

Potential Mitigations

  • Use a mechanism that can validate the identity of the source, such as a certificate, and validate the integrity of data to ensure that it cannot be modified in transit using an Adversary-in-the-Middle (AITM) attack.
  • When designing functionality of actions in the URL scheme, consider whether the action should be accessible to all mobile applications, or if an allowlist of applications to interface with is appropriate.

References