Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests

Posted on October 29, 2025October 29, 2025 By CWS

Microsoft has issued a crucial safety replace for ASP.NET Core to handle CVE-2025-55315, a high-severity flaw that allows HTTP request smuggling and will permit attackers to bypass key safety controls.

Disclosed on October 14, 2025, this vulnerability has a CVSS v3.1 rating of 9.9, making it one of the crucial extreme points ever reported within the ASP.NET ecosystem.

The flaw stems from inconsistent dealing with of HTTP requests within the Kestrel internet server element, which may let authenticated attackers inject hidden requests to escalate privileges or entry delicate information.

Whereas HTTP request smuggling is a well known assault vector, this particular implementation in ASP.NET Core amplifies dangers for internet functions counting on the framework for authentication and authorization.

Attackers exploit discrepancies between how proxies and servers parse headers like Content material-Size and Switch-Encoding, smuggling malicious payloads that evade regular processing.

For example, a crafted POST request may embed a hid GET to an admin endpoint, tricking the system into executing unauthorized actions with out detection.

Understanding HTTP Request Smuggling

At its core, HTTP request smuggling leverages parsing inconsistencies throughout community elements, corresponding to front-end proxies and back-end servers.

An attacker sends a request with ambiguous headers, like combining Content material-Size and Switch-Encoding, inflicting the proxy to interpret it a technique whereas the server sees the smuggled content material in a different way.

This may end up in the second request bypassing fee limits, CSRF protections, and even authentication checks, resulting in extreme outcomes in multi-tiered environments.

Within the CVE-2025-55315 case, the Kestrel server’s failure to validate request boundaries below sure situations permits smuggled requests to succeed in utility logic intact.

This impacts all supported ASP.NET Core variations, together with 8.0, 9.0, and 10.0 previews, notably in setups with reverse proxies like NGINX or Azure Entrance Door.

Exploitation requires community entry and sometimes low privileges, however the scope can prolong to confidential information publicity or server crashes in worst-case situations.

The vulnerability’s excessive rating underscores its potential for chained assaults, from session hijacking to server-side request forgery.

Not all functions are equally uncovered; dangers heighten if customized request parsing, header-based choices, or skipped validations are in play.

For regulated sectors dealing with delicate information, unpatched methods may face compliance violations alongside direct threats like privilege escalation.

Assault VectorPotential ImpactDepends OnSmuggled login requestElevation of privilegeApp logic trusting headersSmuggled inner API callSSRFApp routing and endpointsSmuggled CSRF bypassSession hijackingCSRF token validationSmuggled injection payloadCode executionInput sanitization gaps

Mitigations

Microsoft urges fast patching through the newest .NET updates for affected variations, adopted by utility restarts.

Builders ought to audit request-handling code, particularly round auth and enter validation, whereas making certain proxies normalize site visitors to dam smuggling makes an attempt.

Monitoring logs for anomalous patterns and testing with instruments like these simulating HRS can additional harden defenses. By making use of these measures, organizations can safeguard ASP.NET functions towards this pervasive menace panorama.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:ASP.NET, Attackers, Details, Enables, HTTP, Microsoft, Requests, Smuggle, Vulnerability

Post navigation

Previous Post: New Android Malware Herodotus Mimic Human Behaviour to Bypass Biometrics Detection
Next Post: Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack

Related Posts

WhatsApp 0-Click Vulnerability Exploited Using Malicious DNG File Cyber Security News
SmartLoader Malware via Github Repository as Legitimate Projects Infection Users Computer Cyber Security News
New DNS Malware Detour Dog Delivers Strela Stealer Using DNS TXT Records Cyber Security News
Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads Cyber Security News
Ivanti Cloud Services Application Vulnerability Leads to Privilege Escalation Cyber Security News
New Wave of Crypto-Hijacking Infects 3,500+ Websites Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Accessibility Flaw Allows Stealthy Persistence and Lateral Movement via Narrator DLL Hijack
  • XWiki Vulnerability Exploited in Cryptocurrency Mining Operation
  • Discover Practical AI Tactics for GRC — Join the Free Expert Webinar
  • Chrome to Turn HTTPS on by Default for Public Sites
  • Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Accessibility Flaw Allows Stealthy Persistence and Lateral Movement via Narrator DLL Hijack
  • XWiki Vulnerability Exploited in Cryptocurrency Mining Operation
  • Discover Practical AI Tactics for GRC — Join the Free Expert Webinar
  • Chrome to Turn HTTPS on by Default for Public Sites
  • Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News