{"id":"CVE-2025-57808","summary":"ESP-IDF web_server basic auth bypass using empty or incomplete Authorization header","details":"ESPHome is a system to control microcontrollers remotely through Home Automation systems. In version 2025.8.0 in the ESP-IDF platform, ESPHome's web_server authentication check can pass incorrectly when the client-supplied base64-encoded Authorization value is empty or is a substring of the correct value. This allows access to web_server functionality (including OTA, if enabled) without knowing any information about the correct username or password. This issue has been patched in version 2025.8.1.","aliases":["GHSA-mxh2-ccgj-8635"],"modified":"2026-04-02T12:55:46.146252Z","published":"2025-09-02T00:26:09.017Z","database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/57xxx/CVE-2025-57808.json","cwe_ids":["CWE-303"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/57xxx/CVE-2025-57808.json"},{"type":"ADVISORY","url":"https://github.com/esphome/esphome/security/advisories/GHSA-mxh2-ccgj-8635"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-57808"},{"type":"FIX","url":"https://github.com/esphome/esphome/commit/2aceb56606ec8afec5f49c92e140c8050a6ccbe5"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/esphome/esphome","events":[{"introduced":"0"},{"last_affected":"2adb99324227f5057a5ce2fbc4bbcbf3d6d242cd"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"= 2025.8.0"}]}}],"versions":["2021.10.0","2021.10.0b1","2021.10.0b10","2021.10.0b11","2021.10.0b2","2021.10.0b3","2021.10.0b4","2021.10.0b5","2021.10.0b6","2021.10.0b7","2021.10.0b8","2021.10.0b9","2021.10.1","2021.10.2","2021.10.3","2021.11.0","2021.11.0b1","2021.11.0b2","2021.11.0b3","2021.11.0b4","2021.11.0b5","2021.11.0b6","2021.11.0b7","2021.11.0b8","2021.11.0b9","2021.11.1","2021.11.2","2021.11.3","2021.11.4","2021.12.0","2021.12.0b1","2021.12.0b2","2021.12.0b3","2021.12.0b4","2021.12.0b5","2021.12.0b6","2021.12.1","2021.12.2","2021.12.3","2021.8.0","2021.8.1","2021.8.2","2021.9.0","2021.9.0b1","2021.9.0b2","2021.9.0b3","2021.9.0b4","2021.9.0b5","2021.9.1","2021.9.2","2021.9.3","2022.1.0","2022.1.0b1","2022.1.0b2","2022.1.0b3","2022.1.0b4","2022.1.1","2022.1.2","2022.1.3","2022.1.4","2022.10.0","2022.10.0b1","2022.10.0b2","2022.10.1","2022.10.2","2022.11.0","2022.11.0b1","2022.11.0b2","2022.11.0b3","2022.11.0b4","2022.11.0b5","2022.11.0b6","2022.11.1","2022.11.2","2022.11.3","2022.11.4","2022.11.5","2022.12.0","2022.12.0b1","2022.12.0b2","2022.12.0b3","2022.12.0b4","2022.12.0b5","2022.12.0b6","2022.12.1","2022.12.2","2022.12.3","2022.12.4","2022.12.5","2022.12.6","2022.12.7","2022.12.8","2022.2.0","2022.2.0b1","2022.2.0b2","2022.2.0b3","2022.2.1","2022.2.2","2022.2.3","2022.2.4","2022.2.5","2022.2.6","2022.3.0","2022.3.0b1","2022.3.0b2","2022.3.1","2022.3.2","2022.4.0","2022.4.0b1","2022.4.0b2","2022.4.0b3","2022.4.0b4","2022.5.0","2022.5.0b1","2022.5.0b2","2022.5.0b3","2022.5.0b4","2022.5.1","2022.6.0","2022.6.0b1","2022.6.0b2","2022.6.0b3","2022.6.0b4","2022.6.1","2022.6.2","2022.6.3","2022.8.0","2022.8.0b1","2022.8.0b2","2022.8.0b3","2022.8.1","2022.8.2","2022.8.3","2022.9.0","2022.9.0b1","2022.9.0b2","2022.9.0b3","2022.9.0b4","2022.9.0b5","2022.9.1","2022.9.2","2022.9.3","2022.9.4","2023.10.0","2023.10.0b1","2023.10.0b2","2023.10.0b3","2023.10.0b4","2023.10.1","2023.10.2","2023.10.3","2023.10.4","2023.10.5","2023.10.6","2023.11.0","2023.11.0b1","2023.11.0b2","2023.11.0b3","2023.11.0b4","2023.11.0b5","2023.11.0b6","2023.11.0b7","2023.11.1","2023.11.2","2023.11.3","2023.11.4","2023.11.5","2023.11.6","2023.12.0","2023.12.0b1","2023.12.0b2","2023.12.0b3","2023.12.0b4","2023.12.0b5","2023.12.0b6","2023.12.1","2023.12.2","2023.12.3","2023.12.4","2023.12.5","2023.12.6","2023.12.7","2023.12.8","2023.12.9","2023.2.0","2023.2.0b1","2023.2.0b2","2023.2.0b3","2023.2.0b4","2023.2.0b5","2023.2.1","2023.2.2","2023.2.3","2023.2.4","2023.3.0","2023.3.0b1","2023.3.0b2","2023.3.0b3","2023.3.0b4","2023.3.0b5","2023.3.0b6","2023.3.1","2023.3.2","2023.4.0","2023.4.0b1","2023.4.0b2","2023.4.0b3","2023.4.0b4","2023.4.1","2023.4.2","2023.4.3","2023.4.4","2023.5.0","2023.5.0b1","2023.5.0b2","2023.5.0b3","2023.5.0b4","2023.5.0b5","2023.5.1","2023.5.2","2023.5.3","2023.5.4","2023.5.5","2023.6.0","2023.6.0b1","2023.6.0b2","2023.6.0b3","2023.6.0b4","2023.6.0b5","2023.6.0b6","2023.6.0b7","2023.6.1","2023.6.2","2023.6.3","2023.6.4","2023.6.5","2023.7.0","2023.7.0b1","2023.7.0b2","2023.7.0b3","2023.7.1","2023.8.0","2023.8.0b1","2023.8.0b2","2023.8.0b3","2023.8.0b4","2023.8.1","2023.8.2","2023.8.3","2023.9.0","2023.9.0b1","2023.9.0b2","2023.9.0b3","2023.9.0b4","2023.9.1","2023.9.2","2023.9.3","2024.10.0","2024.10.0b1","2024.10.0b2","2024.10.1","2024.10.2","2024.10.3","2024.11.0","2024.11.0b1","2024.11.0b2","2024.11.0b3","2024.11.0b4","2024.11.1","2024.11.2","2024.11.3","2024.12.0","2024.12.0b1","2024.12.0b2","2024.12.0b3","2024.12.1","2024.12.2","2024.12.3","2024.12.4","2024.2.0","2024.2.0b1","2024.2.0b2","2024.2.0b3","2024.2.1","2024.2.2","2024.3.0","2024.3.0b1","2024.3.0b2","2024.3.0b3","2024.3.0b4","2024.3.0b5","2024.3.1","2024.3.2","2024.4.0","2024.4.0b1","2024.4.0b2","2024.4.0b3","2024.4.1","2024.4.2","2024.5.0","2024.5.0b1","2024.5.0b2","2024.5.0b3","2024.5.0b4","2024.5.0b5","2024.5.0b6","2024.5.1","2024.5.2","2024.5.3","2024.5.4","2024.5.5","2024.6.0","2024.6.0b1","2024.6.0b2","2024.6.0b3","2024.6.0b4","2024.6.0b5","2024.6.1","2024.6.2","2024.6.3","2024.6.4","2024.6.5","2024.6.6","2024.7.0","2024.7.0b1","2024.7.0b2","2024.7.0b3","2024.7.0b4","2024.7.1","2024.7.2","2024.7.3","2024.8.0","2024.8.0b1","2024.8.0b2","2024.8.0b3","2024.8.0b4","2024.8.1","2024.8.2","2024.8.3","2024.9.0","2024.9.0b1","2024.9.0b2","2024.9.0b3","2024.9.0b4","2024.9.1","2024.9.2","2025.2.0","2025.2.0b1","2025.2.0b2","2025.2.0b3","2025.2.0b4","2025.2.0b5","2025.2.0b6","2025.2.1","2025.2.2","2025.3.0","2025.3.0b1","2025.3.0b2","2025.3.0b3","2025.3.0b4","2025.3.0b5","2025.3.1","2025.3.2","2025.3.3","2025.4.0","2025.4.0b1","2025.4.0b2","2025.4.0b3","2025.4.1","2025.4.2","2025.5.0","2025.5.0b1","2025.5.0b2","2025.5.0b3","2025.5.0b4","2025.5.0b5","2025.5.0b6","2025.5.1","2025.5.2","2025.6.0","2025.6.0b1","2025.6.0b2","2025.6.0b3","2025.6.1","2025.6.2","2025.6.3","2025.7.0","2025.7.0b1","2025.7.0b2","2025.7.0b3","2025.7.0b4","2025.7.0b5","2025.7.1","2025.7.2","2025.7.3","2025.7.4","2025.7.5","2025.8.0","2025.8.0b1","2025.8.0b2","2025.8.0b3","2025.8.0b4","v1.1","v1.10.0","v1.10.0b1","v1.10.0b2","v1.10.1","v1.11.0","v1.11.0b1","v1.11.0b2","v1.11.0b3","v1.11.1","v1.11.2","v1.12.0","v1.12.0b1","v1.12.0b2","v1.12.0b3","v1.12.0b4","v1.12.1","v1.12.2","v1.13.0","v1.13.0b1","v1.13.0b2","v1.13.0b3","v1.13.0b4","v1.13.0b5","v1.13.0b6","v1.13.0b7","v1.13.1","v1.13.2","v1.13.3","v1.13.4","v1.13.5","v1.13.6","v1.14.0","v1.14.0b1","v1.14.0b2","v1.14.0b3","v1.14.0b4","v1.14.0b5","v1.14.1","v1.14.2","v1.14.3","v1.14.4","v1.14.5","v1.15.0","v1.15.0b1","v1.15.0b2","v1.15.0b3","v1.15.0b4","v1.15.1","v1.15.2","v1.15.3","v1.16.0","v1.16.0b1","v1.16.0b2","v1.16.0b3","v1.16.0b4","v1.16.0b5","v1.16.0b6","v1.16.0b7","v1.16.0b8","v1.16.1","v1.16.2","v1.17.0","v1.17.0b1","v1.17.1","v1.17.2","v1.18.0","v1.18.0b1","v1.18.0b2","v1.18.0b3","v1.18.0b4","v1.19.0","v1.19.0b1","v1.19.0b2","v1.19.0b3","v1.19.0b4","v1.19.0b5","v1.19.0b6","v1.19.0b7","v1.19.1","v1.19.2","v1.19.3","v1.19.4","v1.2.1","v1.2.2","v1.20.0","v1.20.0b1","v1.20.0b2","v1.20.0b3","v1.20.0b4","v1.20.0b5","v1.20.0b6","v1.20.1","v1.20.2","v1.20.3","v1.20.4","v1.21.0b1","v1.21.0b2","v1.21.0b3","v1.3.0","v1.4.0","v1.5.0","v1.5.1","v1.5.2","v1.5.3","v1.6.0","v1.6.1","v1.6.2","v1.7.0","v1.8.0","v1.8.1","v1.8.2","v1.9.0","v1.9.0b1","v1.9.0b2","v1.9.0b3","v1.9.0b4","v1.9.0b5","v1.9.0b6","v1.9.1","v1.9.2","v1.9.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-57808.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}