CVE-2025-23048
Apache HTTP Server vulnerability analysis and mitigation

Overview

In some modssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. The vulnerability affects configurations where modssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates. The issue was discovered by researchers from Paderborn University and assigned CVE-2025-23048 (Apache Security, NVD).

Technical details

The vulnerability occurs when mod_ssl is configured with multiple virtual hosts, each having different trusted client certificate restrictions (for example, using different SSLCACertificateFile/Path settings). In such configurations, a client trusted to access one virtual host may gain unauthorized access to another virtual host if SSLStrictSNIVHostCheck is not enabled in either virtual host. The vulnerability has been assigned a CVSS v3.1 base score of 9.1 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) (NVD).

Impact

The vulnerability allows trusted clients to bypass access control mechanisms between different virtual hosts. A client with legitimate access to one virtual host could potentially access resources on another virtual host that they should not have permission to access (Apache Security).

Mitigation and workarounds

Users are recommended to upgrade to Apache HTTP Server version 2.4.64, which fixes this vulnerability. Alternatively, enabling SSLStrictSNIVHostCheck in the virtual host configurations can prevent the access control bypass (Apache Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management