Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-25690: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') in Apache Software Foundation Apache HTTP Server

0
Critical
VulnerabilityCVE-2023-25690cvecve-2023-25690cwe-444
Published: Tue Mar 07 2023 (03/07/2023, 15:09:03 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache HTTP Server

Description

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

AI-Powered Analysis

AILast updated: 12/18/2025, 16:11:26 UTC

Technical Analysis

CVE-2023-25690 is a critical vulnerability classified under CWE-444 (Inconsistent Interpretation of HTTP Requests), commonly known as HTTP Request Smuggling, found in Apache HTTP Server versions 2.4.0 through 2.4.55. This vulnerability occurs specifically when mod_proxy is enabled alongside certain RewriteRule or ProxyPassMatch directives that use non-specific patterns to match user-supplied request-target data and then re-insert this data into proxied requests via variable substitution. For example, a RewriteRule like "^/here/(.*)" "http://example.com:8080/elsewhere?$1" with the [P] flag can be exploited. The core issue is that the proxy server and the backend server interpret the boundaries of HTTP requests differently, allowing an attacker to smuggle a crafted HTTP request that can be interpreted as two separate requests by the backend. This can lead to bypassing access controls on the proxy, redirecting proxy requests to unintended URLs, and cache poisoning attacks. The vulnerability does not require authentication or user interaction and can be exploited remotely over the network. The Apache Software Foundation has addressed this issue in version 2.4.56 by correcting the parsing inconsistencies. The CVSS v3.1 base score is 9.8, indicating critical severity with high impact on confidentiality, integrity, and availability, and low attack complexity.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on Apache HTTP Server as a reverse proxy or load balancer in their web infrastructure. Successful exploitation can lead to unauthorized access to internal services, bypassing of security controls, and manipulation of cached content, potentially resulting in data leakage, session hijacking, or service disruption. Critical sectors such as finance, healthcare, government, and telecommunications that depend on Apache HTTP Server for secure web traffic routing are particularly vulnerable. The ability to proxy unintended URLs could expose internal applications not meant for public access, increasing the attack surface. Cache poisoning can mislead users or automated systems, causing further security and operational issues. Given the widespread use of Apache HTTP Server across Europe, the potential impact is broad and severe.

Mitigation Recommendations

Organizations should immediately upgrade Apache HTTP Server to version 2.4.56 or later, where this vulnerability is fixed. Until patching is possible, administrators should audit mod_proxy configurations, especially those using RewriteRule or ProxyPassMatch with variable substitutions involving user input, and apply strict input validation or sanitization to prevent injection of malicious request fragments. Disabling mod_proxy if not required can reduce exposure. Implementing Web Application Firewalls (WAFs) with rules to detect and block anomalous HTTP request patterns indicative of request smuggling attempts can provide additional protection. Monitoring proxy logs for irregular request patterns and unusual backend responses can help detect exploitation attempts. Network segmentation and limiting proxy access to trusted sources can further reduce risk. Finally, ensure that cache configurations are hardened to prevent poisoning, such as by validating cache keys and headers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2023-02-12T13:28:31.657Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6944242d4eb3efac36964747

Added to database: 12/18/2025, 3:56:29 PM

Last enriched: 12/18/2025, 4:11:26 PM

Last updated: 12/19/2025, 4:20:06 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats