SB2025052212 - cPanel EasyApache4 update for third-party components 



SB2025052212 - cPanel EasyApache4 update for third-party components

Published: May 22, 2025

Security Bulletin ID SB2025052212
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Improper error handling (CVE-ID: CVE-2025-23166)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect error handling in async cryptographic operations within the SignTraits::DeriveBits() function. A remote attacker can send specially crafted input to the application can crash the Node.js runtime.


2) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2025-23167)

The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP/1 headers in llhttp. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.


3) Memory leak (CVE-ID: CVE-2025-23165)

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak in ReadFileUtf8 caused by a corrupted pointer. A remote attacker can force the application to leak memory and perform denial of service attack.


4) Incorrect default permissions (CVE-ID: CVE-2023-49582)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to lax permissions set by the Apache Portable Runtime library on Unix platforms. A local user can read the named shared memory segments.


Remediation

Install update from vendor's website.