SSRF in Apache HTTP Server with mod_proxy loaded allows...
High severity
Unreviewed
Published
Jul 10, 2025
to the GitHub Advisory Database
•
Updated Jul 15, 2025
Description
Published by the National Vulnerability Database
Jul 10, 2025
Published to the GitHub Advisory Database
Jul 10, 2025
Last updated
Jul 15, 2025
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request.
Users are recommended to upgrade to version 2.4.64 which fixes this issue.
References