CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Dashboard
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-29914
5.40.10%

The Double-Slash Deception: Bypassing Coraza WAF with RFC Compliance

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 6, 2026·6 min read·15 visits

PoC Available

Executive Summary (TL;DR)

Coraza WAF treated URIs starting with `//` as protocol-relative URLs, interpreting the first path segment as a hostname. This caused the WAF to effectively 'delete' the first directory from the path it inspected (e.g., `//admin` became a host named `admin` with an empty path), allowing attackers to bypass Access Control Lists (ACLs) while the backend server still normalized and served the sensitive path.

A parser logic discrepancy in OWASP Coraza WAF allows attackers to bypass path-based security rules using double slashes in the URI, exploiting Go's standard URL parsing behavior.

Official Patches

GitHubCommit fixing the URI parsing logic
GitHub AdvisoryOfficial Advisory

Fix Analysis (1)

Technical Appendix

CVSS Score
5.4/ 10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
EPSS Probability
0.10%
Top 100% most exploited

Affected Systems

OWASP Coraza WAF < 3.3.3Go applications using Coraza as a libraryCaddy with Coraza WAF module (older versions)Traefik with Coraza middleware (older versions)

Affected Versions Detail

Product
Affected Versions
Fixed Version
Coraza WAF
OWASP
< 3.3.33.3.3
AttributeDetail
CWE IDCWE-706 (Incorrectly-Resolved Name)
Attack VectorNetwork (HTTP)
CVSS v3.15.4 (Medium)
ImpactSecurity Bypass / ACL Evasion
Exploit StatusPoC Available
LanguageGo (Golang)

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1006Direct Volume Access (File System Logical Offset equivalent)
Defense Evasion
CWE-706
Use of Incorrectly-Resolved Name or Reference

The software uses a name or reference that resolves to a resource different from the intended one, leading to incorrect authorization decisions.

Known Exploits & Detection

Manual AnalysisSend request to //target-path to bypass rules starting with /target-path

Vulnerability Timeline

Internal discovery of URI normalization issues
2025-01-09
Fix committed to repository
2025-03-17
Coraza v3.3.3 released and Advisory Published
2025-03-20

References & Sources

  • [1]GHSA-q9f5-625g-xm39
  • [2]Go Documentation: url.Parse
  • [3]RFC 3986: Path

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.