- Description
- Server-Side Request Forgery (SSRF) vulnerability in Apache HTTP Server on Windows with AllowEncodedSlashes On and MergeSlashes Off allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.66, which fixes the issue.
- Source
- security@apache.org
- NVD status
- Analyzed
- Products
- http_server
CVSS 3.1
- Type
- Secondary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
- security@apache.org
- CWE-918
- Hype score
- Not currently trending
#VulnerabilityReport #ApacheHTTPServer Apache HTTP Server 2.4.66 Fixes SSRF Flaw (CVE-2025-59775) Exposing NTLM Hashes on Windows and suexec Bypass https://t.co/JMULKtneyc
@Komodosec
10 Jan 2026
55 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-59775 Server-Side Request Forgery in Apache HTTP Server Enabling NTLM Hash Leakage https://t.co/nkM6IF5plf
@VulmonFeeds
5 Dec 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Apache HTTP Server CVE-2025-55753: mod_md (ACME), unintended retry intervals https://t.co/AdZUnjd4K9 CVE-2025-58098: Server Side Includes adds query string to #exec cmd=... https://t.co/77ushB6TZv CVE-2025-59775: NTLM Leakage on Windows through UNC SSRF https://t.co/1mTjz35NfJ
@oss_security
4 Dec 2025
364 Impressions
1 Retweet
2 Likes
0 Bookmarks
1 Reply
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E190AC9-8786-444C-877C-DE4BC272331F",
"versionEndExcluding": "2.4.66",
"versionStartIncluding": "2.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]