CVE-2025-66200
BaseFortify
Publication date: 2025-12-05
Last updated on: 2025-12-10
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | http_server | From 2.4.7 (inc) to 2.4.66 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-288 | The product requires authentication, but the product has an alternate path or channel that does not require authentication. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a mod_userdir+suexec bypass in Apache HTTP Server caused by an AllowOverride FileInfo issue. It allows users who can use the RequestHeader directive in htaccess files to make some CGI scripts run under an unexpected user ID, potentially bypassing intended user restrictions.
How can this vulnerability impact me? :
The vulnerability can lead to CGI scripts running with unexpected user privileges, which may allow unauthorized access or actions on the server, potentially compromising security and user isolation.
What immediate steps should I take to mitigate this vulnerability?
Users are recommended to upgrade Apache HTTP Server to version 2.4.66, which fixes the issue.