In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption.
Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://httpd.apache.org/security/vulnerabilities_24.html |
![]() ![]() |
History
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Thu, 10 Jul 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host. | |
Title | Apache HTTP Server: mod_ssl access control bypass with session resumption | |
Weaknesses | CWE-284 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published: 2025-07-10T16:56:53.545Z
Updated: 2025-07-10T16:56:53.545Z
Reserved: 2025-01-10T15:11:45.480Z
Link: CVE-2025-23048

No data.

Status : Received
Published: 2025-07-10T17:15:46.553
Modified: 2025-07-10T17:15:46.553
Link: CVE-2025-23048

No data.