Critical Request Smuggling Vulnerability in ASP.NET Core Kestrel Web Server
Microsoft has addressed a critical security vulnerability in the Kestrel web server component of ASP.NET Core, tracked as CVE-2025-55315, which received a CVSS severity score of 9.9—the highest ever assigned by Microsoft to a flaw in this framework. The vulnerability enables HTTP request smuggling, a technique where an attacker can embed a malicious request within a legitimate one, potentially bypassing authentication and other security controls. This flaw affects all currently supported versions of ASP.NET Core, including versions 8, 9, and 10, as well as the older ASP.NET Core 2.3 running on the Windows-only .NET Framework. According to Microsoft’s security advisory, the vulnerability allows authenticated attackers to exploit inconsistent HTTP request interpretation, leading to the bypass of security features over a network. Security program manager Barry Dorrans explained that a successful attack could allow an adversary to log in as a different user, circumvent cross-site request forgery (CSRF) protections, or perform injection attacks. The actual risk posed by this vulnerability is highly dependent on the specific application code and deployment configuration, with the most severe outcomes occurring in applications that do not properly validate or handle HTTP requests. Dorrans emphasized that while the vulnerability is serious, the likelihood of exploitation is reduced if applications are well-designed and if reverse proxies or gateways are used to filter out smuggled requests. The high CVSS score reflects the potential for a security feature bypass that changes the scope of access, rather than the likelihood of exploitation in all environments. Developers have sought clarification on what constitutes vulnerable application code, but Microsoft has indicated that any application performing authentication or access control based on HTTP requests could be at risk if not properly secured. Kestrel is widely used as the default web server for ASP.NET Core applications, both behind reverse proxies and as a direct-facing server, increasing the potential exposure. Microsoft’s patch addresses the underlying issue in Kestrel, and organizations are urged to apply updates promptly to mitigate the risk. The vulnerability highlights the importance of secure coding practices and the need for defense-in-depth measures, such as using reverse proxies to sanitize incoming requests. Security teams should review their ASP.NET Core deployments, especially those directly exposing Kestrel to the internet, to ensure they are not susceptible to request smuggling attacks. The incident underscores the evolving complexity of web application security and the critical role of timely patch management. Microsoft’s response demonstrates a commitment to transparency and rapid remediation for high-severity vulnerabilities in its ecosystem. Organizations leveraging ASP.NET Core should remain vigilant for further advisories and best practice recommendations from Microsoft and the broader security community.
Timeline
Oct 14, 2025
Microsoft assigns record 9.9 severity to the ASP.NET Core vulnerability
Microsoft rated CVE-2025-55315 at CVSS 9.9, described in reporting as the highest severity score ever assigned to an ASP.NET Core flaw. The company said the bug was not known to be exploited in the wild but urged customers to update and redeploy affected applications quickly.
Oct 14, 2025
Microsoft patches critical ASP.NET Core Kestrel flaw CVE-2025-55315
As part of October 2025 Patch Tuesday, Microsoft released fixes for CVE-2025-55315, a critical HTTP request smuggling vulnerability in the Kestrel web server component of ASP.NET Core. The flaw affects supported ASP.NET Core versions and can allow attackers to bypass authentication and other security controls depending on application behavior.
See the full picture in Mallory
Mallory subscribers get deeper analysis on every story, including:
Who’s affected and how
Deep-dive technical analysis
Actionable next steps for your team
IPs, domains, hashes, and more
Ask questions and take action on every story
Filter by topic, classification, timeframe
Get matching stories delivered automatically
Related Entities
Organizations
Sources
Related Stories

Critical ASP.NET Core Vulnerability (CVE-2025-55315) Exposes QNAP NetBak PC Agent to Credential Theft and Security Bypass
QNAP has issued an urgent warning regarding a critical vulnerability, CVE-2025-55315, affecting its NetBak PC Agent backup utility for Windows. The flaw, rooted in Microsoft’s ASP.NET Core framework and specifically the Kestrel server, enables attackers to exploit HTTP request smuggling techniques to bypass security controls, hijack credentials, and potentially access or modify sensitive backup data. The vulnerability, which carries a CVSS score of up to 9.9, requires attackers to have valid credentials but can result in unauthorized access, file modification, or limited denial-of-service conditions if exploited. QNAP’s advisory highlights that the NetBak PC Agent installs and relies on the vulnerable ASP.NET Core components, making any unpatched system susceptible to attack. Security researchers and QNAP emphasize the importance of immediate remediation, recommending users either reinstall the NetBak PC Agent to ensure the latest ASP.NET Core runtime is deployed or manually update the ASP.NET Core components on affected systems. The vulnerability’s impact is heightened by the fact that backup servers, which often store critical data, are at risk if running outdated ASP.NET Core versions. QNAP strongly urges all users to verify their systems are up to date to prevent exploitation and safeguard backup integrity and data availability.
1 months ago
Microsoft Patches Remote Denial-of-Service Vulnerabilities in .NET and ASP.NET Core
Microsoft published security advisories for two **Important** remote **denial-of-service (DoS)** vulnerabilities affecting **.NET** and **ASP.NET Core**: **CVE-2026-26127** and **CVE-2026-26130**. Both issues are scored **CVSS 3.1 7.5** with `AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H`, indicating network-reachable exploitation with low complexity, no privileges, and no user interaction, resulting in high availability impact. CVE-2026-26127 is described as a **.NET DoS** condition associated with **CWE-125 (Out-of-bounds Read)**, while CVE-2026-26130 is an **ASP.NET Core DoS** issue associated with **CWE-770 (Allocation of Resources Without Limits or Throttling)**. Organizations running internet-exposed or high-availability services on these frameworks should prioritize applying Microsoft’s updates and review service-level protections (e.g., request throttling and resource limits) where applicable to reduce DoS risk.
1 months ago
Microsoft Issues Emergency Patch for ASP.NET Core Data Protection Privilege Escalation
Microsoft released an out-of-band update for **`Microsoft.AspNetCore.DataProtection` 10.0.7** to fix **`CVE-2026-40372`**, a critical ASP.NET Core elevation-of-privilege flaw caused by improper verification of cryptographic signatures (**`CWE-347`**). The regression affects package versions **10.0.0 through 10.0.6** and was uncovered while Microsoft investigated customer-reported decryption failures after the .NET 10.0.6 Patch Tuesday release. Microsoft said the bug in the managed authenticated encryptor could let unauthenticated attackers bypass HMAC validation, forge authentication cookies and other protected payloads, decrypt some protected data, and potentially authenticate as privileged users. The vulnerability primarily affects applications running the vulnerable NuGet package at runtime on **Linux, macOS, and other non-Windows systems**, with some **`net462`** and **`netstandard2.0`** consumers also exposed; Microsoft said Windows deployments and the **8.0.x** and **9.0.x** branches are not affected under the described conditions. Because ASP.NET Core Data Protection is widely used for cookies, tokens, anti-forgery protections, TempData, and similar application state, successful exploitation can enable file disclosure and data modification without impacting availability. Microsoft urged organizations to upgrade to **`10.0.7`**, rebuild and redeploy affected applications, rotate the **DataProtection key ring**, and audit long-lived tokens, API keys, password reset links, and logs because legitimately signed artifacts issued during exploitation may remain valid after patching.
1 weeks ago