frp is a fast reverse proxy. From 0.43.0 to 0.68.0, frp contains an authentication bypass in the HTTP vhost routing path when routeByHTTPUser is used as part of access control. In proxy-style requests, the routing logic uses the username from Proxy-Authorization to select the routeByHTTPUser backend, while the access control check uses credentials from the regular Authorization header. As a result, an attacker who can reach the HTTP vhost entrypoint and knows or can guess the protected routeByHTTPUser value may access a backend protected by httpUser / httpPassword even with an incorrect Proxy-Authorization password. This issue affects deployments that explicitly use routeByHTTPUser. It does not affect ordinary HTTP proxies that do not use this feature. This vulnerability is fixed in 0.68.1.
References
| Link | Resource |
|---|---|
| https://github.com/fatedier/frp/security/advisories/GHSA-pq96-pwvg-vrr9 | Exploit Vendor Advisory |
| https://github.com/fatedier/frp/security/advisories/GHSA-pq96-pwvg-vrr9 | Exploit Vendor Advisory |
Configurations
History
29 Apr 2026, 23:20
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Fatedier
Fatedier frp |
|
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:a:fatedier:frp:*:*:*:*:*:*:*:* | |
| References | () https://github.com/fatedier/frp/security/advisories/GHSA-pq96-pwvg-vrr9 - Exploit, Vendor Advisory |
21 Apr 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-21 21:16
Updated : 2026-04-29 23:20
NVD link : CVE-2026-40910
Mitre link : CVE-2026-40910
CVE.ORG link : CVE-2026-40910
JSON object : View
Products Affected
fatedier
- frp
CWE
