Search for vulnerabilities
| Vulnerability ID | VCID-varh-ysfr-euc8 |
| Aliases |
CVE-2025-66200
|
| Summary | mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid. This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65. Users are recommended to upgrade to version 2.4.66, which fixes the issue. |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 4.9 |
| Risk | 2.5 |
| Affected and Fixed Packages | Package Details |
| System | Score | Found at |
|---|---|---|
| cvssv3 | 5.4 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66200.json |
| epss | 0.00055 | https://api.first.org/data/v1/epss?cve=CVE-2025-66200 |
| epss | 0.00055 | https://api.first.org/data/v1/epss?cve=CVE-2025-66200 |
| epss | 0.0007 | https://api.first.org/data/v1/epss?cve=CVE-2025-66200 |
| epss | 0.0007 | https://api.first.org/data/v1/epss?cve=CVE-2025-66200 |
| epss | 0.0007 | https://api.first.org/data/v1/epss?cve=CVE-2025-66200 |
| epss | 0.0007 | https://api.first.org/data/v1/epss?cve=CVE-2025-66200 |
| epss | 0.0007 | https://api.first.org/data/v1/epss?cve=CVE-2025-66200 |
| epss | 0.0007 | https://api.first.org/data/v1/epss?cve=CVE-2025-66200 |
| cvssv3.1 | 6.2 | https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml |
| cvssv3.1 | 5.4 | https://httpd.apache.org/security/vulnerabilities_24.html |
| ssvc | Track | https://httpd.apache.org/security/vulnerabilities_24.html |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Percentile | 0.17472 |
| EPSS Score | 0.00055 |
| Published At | April 2, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T12:36:23.834482+00:00 | Apache HTTPD Importer | Import | https://httpd.apache.org/security/json/CVE-2025-66200.json | 38.0.0 |