CVE-2025-23048

CRITICAL

Apache HTTP Server < 2.4.64 - Improper Access Control

Title source: rule

Description

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

Exploits (2)

github WORKING POC 4 stars
by absholi7ly · poc
https://github.com/absholi7ly/CVE-2025-23048-POC
github SCANNER 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-23048

Scores

CVSS v3 9.1
EPSS 0.0003
EPSS Percentile 8.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Classification

CWE
CWE-284
Status published

Affected Products (1)

apache/http_server < 2.4.64

Timeline

Published Jul 10, 2025
Tracked Since Feb 18, 2026