Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests

Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests

Posted on October 29, 2025October 29, 2025 By CWS

Microsoft has issued a crucial safety replace for ASP.NET Core to handle CVE-2025-55315, a high-severity flaw that allows HTTP request smuggling and will permit attackers to bypass key safety controls.

Disclosed on October 14, 2025, this vulnerability has a CVSS v3.1 rating of 9.9, making it one of the crucial extreme points ever reported within the ASP.NET ecosystem.

The flaw stems from inconsistent dealing with of HTTP requests within the Kestrel internet server element, which may let authenticated attackers inject hidden requests to escalate privileges or entry delicate information.

Whereas HTTP request smuggling is a well known assault vector, this particular implementation in ASP.NET Core amplifies dangers for internet functions counting on the framework for authentication and authorization.

Attackers exploit discrepancies between how proxies and servers parse headers like Content material-Size and Switch-Encoding, smuggling malicious payloads that evade regular processing.

For example, a crafted POST request may embed a hid GET to an admin endpoint, tricking the system into executing unauthorized actions with out detection.

Understanding HTTP Request Smuggling

At its core, HTTP request smuggling leverages parsing inconsistencies throughout community elements, corresponding to front-end proxies and back-end servers.

An attacker sends a request with ambiguous headers, like combining Content material-Size and Switch-Encoding, inflicting the proxy to interpret it a technique whereas the server sees the smuggled content material in a different way.

This may end up in the second request bypassing fee limits, CSRF protections, and even authentication checks, resulting in extreme outcomes in multi-tiered environments.

Within the CVE-2025-55315 case, the Kestrel server’s failure to validate request boundaries below sure situations permits smuggled requests to succeed in utility logic intact.

This impacts all supported ASP.NET Core variations, together with 8.0, 9.0, and 10.0 previews, notably in setups with reverse proxies like NGINX or Azure Entrance Door.

Exploitation requires community entry and sometimes low privileges, however the scope can prolong to confidential information publicity or server crashes in worst-case situations.

The vulnerability’s excessive rating underscores its potential for chained assaults, from session hijacking to server-side request forgery.

Not all functions are equally uncovered; dangers heighten if customized request parsing, header-based choices, or skipped validations are in play.

For regulated sectors dealing with delicate information, unpatched methods may face compliance violations alongside direct threats like privilege escalation.

Assault VectorPotential ImpactDepends OnSmuggled login requestElevation of privilegeApp logic trusting headersSmuggled inner API callSSRFApp routing and endpointsSmuggled CSRF bypassSession hijackingCSRF token validationSmuggled injection payloadCode executionInput sanitization gaps

Mitigations

Microsoft urges fast patching through the newest .NET updates for affected variations, adopted by utility restarts.

Builders ought to audit request-handling code, particularly round auth and enter validation, whereas making certain proxies normalize site visitors to dam smuggling makes an attempt.

Monitoring logs for anomalous patterns and testing with instruments like these simulating HRS can additional harden defenses. By making use of these measures, organizations can safeguard ASP.NET functions towards this pervasive menace panorama.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:ASP.NET, Attackers, Details, Enables, HTTP, Microsoft, Requests, Smuggle, Vulnerability

Post navigation

Previous Post: New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection
Next Post: Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack

Related Posts

Building a Cyber-Resilient Organization in 2025 Building a Cyber-Resilient Organization in 2025 Cyber Security News
Threat Actors Attacking Job Seekers With Three New Unique Adversaries Threat Actors Attacking Job Seekers With Three New Unique Adversaries Cyber Security News
Autonomous Bot Exploits GitHub Actions in Major Cyber Attack Autonomous Bot Exploits GitHub Actions in Major Cyber Attack Cyber Security News
Azure Active Directory Vulnerability Exposes credentials and Enables Attackers to Deploy Malicious Apps Azure Active Directory Vulnerability Exposes credentials and Enables Attackers to Deploy Malicious Apps Cyber Security News
New Kerberos Relay Attack Uses DNS CNAME to Bypass Mitigations New Kerberos Relay Attack Uses DNS CNAME to Bypass Mitigations Cyber Security News
Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark