{
  "threat_severity" : "Moderate",
  "public_date" : "2025-12-05T11:02:25Z",
  "bugzilla" : {
    "description" : "httpd: Apache HTTP Server: mod_userdir+suexec bypass via AllowOverride FileInfo",
    "id" : "2419262",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2419262"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-305",
  "details" : [ "mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.\nThis issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.\nUsers are recommended to upgrade to version 2.4.66, which fixes the issue.", "A permissions bypass flaw has been discovered in the apache HTTP server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid." ],
  "affected_release" : [ {
    "product_name" : "JBoss Core Services for RHEL 8",
    "release_date" : "2026-02-23T00:00:00Z",
    "advisory" : "RHSA-2026:2994",
    "cpe" : "cpe:/a:redhat:jboss_core_services:1::el8",
    "package" : "jbcs-httpd24-httpd-0:2.4.62-11.el8jbcs"
  }, {
    "product_name" : "JBoss Core Services on RHEL 7",
    "release_date" : "2026-02-23T00:00:00Z",
    "advisory" : "RHSA-2026:2994",
    "cpe" : "cpe:/a:redhat:jboss_core_services:1::el7",
    "package" : "jbcs-httpd24-httpd-0:2.4.62-11.el7jbcs"
  }, {
    "product_name" : "Red Hat Enterprise Linux 10",
    "release_date" : "2025-12-22T00:00:00Z",
    "advisory" : "RHSA-2025:23932",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10.1",
    "package" : "httpd-0:2.4.63-4.el10_1.3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-12-22T00:00:00Z",
    "advisory" : "RHSA-2025:23732",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "httpd:2.4-8100020251212173309.489197e6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-12-22T00:00:00Z",
    "advisory" : "RHSA-2025:23919",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "httpd-0:2.4.62-7.el9_7.3"
  }, {
    "product_name" : "Red Hat JBoss Core Services 2.4.62.SP3",
    "release_date" : "2026-02-23T00:00:00Z",
    "advisory" : "RHSA-2026:2995",
    "cpe" : "cpe:/a:redhat:jboss_core_services:1",
    "package" : "jbcs-httpd24-httpd"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "httpd",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "httpd",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Hardened Images 1",
    "fix_state" : "Affected",
    "package_name" : "httpd",
    "cpe" : "cpe:/a:redhat:hummingbird:1"
  }, {
    "product_name" : "Red Hat JBoss Core Services",
    "fix_state" : "Affected",
    "package_name" : "httpd",
    "cpe" : "cpe:/a:redhat:jboss_core_services:1"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-66200\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-66200\nhttp://www.openwall.com/lists/oss-security/2025/12/04/8\nhttps://httpd.apache.org/security/vulnerabilities_24.html" ],
  "name" : "CVE-2025-66200",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}