By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Microsoft Patches Critical ASP.NET Core Vulnerability with 9.9 Severity Score
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Microsoft Patches Critical ASP.NET Core Vulnerability with 9.9 Severity Score
News

Microsoft Patches Critical ASP.NET Core Vulnerability with 9.9 Severity Score

News Room
Last updated: 2025/11/12 at 6:04 AM
News Room Published 12 November 2025
Share
Microsoft Patches Critical ASP.NET Core Vulnerability with 9.9 Severity Score
SHARE

Microsoft recently released a security advisory and patched a critical vulnerability in ASP.NET Core that allows an attacker to bypass a security feature over a network due to an inconsistent interpretation of HTTP requests. With a CVSS score of 9.9 out of 10, CVE-2025-55315 is the highest-rated Microsoft vulnerability.

The vulnerability has been identified in ASP.NET Core versions 10.0, 9.0, 8.0, and the Kestrel package for 2.x. An attacker who is already authorized can bypass a security feature by exploiting inconsistent parsing of HTTP requests and responses. Microsoft states there are no known mitigating factors for the HTTP request/response smuggling scenario and strongly recommends patching to the listed fixed versions to prevent the security bypass.

HTTP request smuggling exploits differences in how servers and proxies parse HTTP requests, using headers such as Content-Length or Transfer-Encoding to hide one request within another. In a follow-up article, the Microsoft Security Response Center explains:

The 9.9 score reflects the importance of promptly addressing this issue, which involves a security feature bypass that can influence how applications enforce authentication and authorization. (…) Depending on how your app processes requests, this could enable techniques like privilege escalation or request manipulation if left unpatched.

Barry Dorrans, security TPM for .NET at Microsoft, clarifies the high score with a comment:

The bug enables HTTP Request Smuggling, which on its own for ASP.NET Core would be nowhere near that high, but that’s not how we rate things. Instead, we score based on how the bug might affect applications built on top of ASP.NET.

Andrew Lock, staff engineer at Datadog and author of .NET Escapades, has published the article “Understanding the worst .NET vulnerability ever: request smuggling and CVE-2025-55315,” providing an example of generic request smuggling, and writes:

For ASP.NET Core applications, if you’re working with HttpRequest.Body or HttpRequest.BodyReader, or other similar methods then you may be vulnerable to attacks even if you’re not explicitly using a proxy server. Even if you don’t think of your application as a proxy or as using a proxy, if you’re doing “proxy-like” things, then you could be vulnerable.

Depending on how an application processes requests, the vulnerability could allow attacks such as elevation of privilege, server-side request forgery (SSRF), cross-site request forgery (CSRF) bypass, and injection attacks that bypass input validation. Microsoft recommends that developers check their proxy configuration and confirm that it normalizes requests and detects smuggling attempts.

Hayden Barnes, senior open source partner manager at HeroDevs, released an ASP.NET Core console application to reproduce and test HTTP chunked transfer and newline parsing behavior, allowing developers to check whether their .NET builds are affected by CVE-2025-55315.

As Microsoft does not publish CVEs for EOL software, many developers on Reddit were initially confused about how the vulnerability affects .NET 6 and earlier releases.

To address the issue, developers must install the patched runtime/SDK versions for ASP.NET Core 8, 9, or 10, or update Microsoft.AspNetCore.Server.Kestrel.Core to version 2.3.6 or above. Third-party releases address the vulnerability for unsupported .NET 6.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Haiku OS Made Many Kernel & App Improvements In October Haiku OS Made Many Kernel & App Improvements In October
Next Article Honor’s wild robot phone is actually coming out next year Honor’s wild robot phone is actually coming out next year
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Exclusive: BoomPop Books M To Help Companies Plan Events And Offsites Using AI
Exclusive: BoomPop Books $25M To Help Companies Plan Events And Offsites Using AI
News
Google relaunches Cameyo to entice businesses from Windows to ChromeOS
Google relaunches Cameyo to entice businesses from Windows to ChromeOS
News
Commvault launches Cloud Unity platform to unify data security, recovery and identity resilience –  News
Commvault launches Cloud Unity platform to unify data security, recovery and identity resilience – News
News
Terrifying ‘Lucifer’ bee becomes latest horror creature discovered in Australia
Terrifying ‘Lucifer’ bee becomes latest horror creature discovered in Australia
News

You Might also Like

Exclusive: BoomPop Books M To Help Companies Plan Events And Offsites Using AI
News

Exclusive: BoomPop Books $25M To Help Companies Plan Events And Offsites Using AI

7 Min Read
Google relaunches Cameyo to entice businesses from Windows to ChromeOS
News

Google relaunches Cameyo to entice businesses from Windows to ChromeOS

2 Min Read
Commvault launches Cloud Unity platform to unify data security, recovery and identity resilience –  News
News

Commvault launches Cloud Unity platform to unify data security, recovery and identity resilience – News

5 Min Read
Terrifying ‘Lucifer’ bee becomes latest horror creature discovered in Australia
News

Terrifying ‘Lucifer’ bee becomes latest horror creature discovered in Australia

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?