#VU112730 Security features bypass in Apache HTTP Server - CVE-2025-23048

 

#VU112730 Security features bypass in Apache HTTP Server - CVE-2025-23048

Published: July 10, 2025 / Updated: January 4, 2026


Vulnerability identifier: #VU112730
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2025-23048
CWE-ID: CWE-254
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
Apache HTTP Server
Software vendor:
Apache Foundation

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to access control bypass with session resumption in mod_ssl. A remote attacker can use the TLS 1.3 session resumption to bypass implemented access control.

Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.


Remediation

Install updates from vendor's website.

External links