Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.
Subscriptions
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4270-1 | apache2 security update |
EUVD |
EUVD-2025-21018 | In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host. |
Ubuntu USN |
USN-7639-1 | Apache HTTP Server vulnerabilities |
Ubuntu USN |
USN-7639-2 | Apache HTTP Server vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 27 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 29 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache http Server |
|
| CPEs | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache http Server |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
ssvc
|
Mon, 14 Jul 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Thu, 10 Jul 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host. | |
| Title | Apache HTTP Server: mod_ssl access control bypass with session resumption | |
| Weaknesses | CWE-284 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-02-26T17:50:47.700Z
Reserved: 2025-01-10T15:11:45.480Z
Link: CVE-2025-23048
Updated: 2025-11-04T21:09:37.109Z
Status : Modified
Published: 2025-07-10T17:15:46.553
Modified: 2025-11-04T22:16:06.920
Link: CVE-2025-23048
OpenCVE Enrichment
Updated: 2025-07-12T22:01:03Z
Debian DLA
EUVD
Ubuntu USN