ASP.NET 8.0.10 - Critical Bypass Vulnerability Discovered

Basically, a flaw in ASP.NET lets hackers sneak past security and steal session data.
A critical vulnerability in ASP.NET 8.0.10 allows attackers to bypass authentication and hijack sessions. Immediate patching is crucial to secure affected systems.
The Flaw
A serious vulnerability has been identified in ASP.NET 8.0.10, specifically affecting the .NET Kestrel server. This flaw, designated as CVE-2025-55315, is classified as a Critical security risk with a CVSS score of 9.8. The vulnerability arises from improper handling of malformed chunked encoding in HTTP requests, enabling attackers to exploit the system remotely.
What's at Risk
The exploit allows for significant security breaches, including:
- Authentication bypass: Attackers can access restricted areas such as
/adminwithout proper credentials. - Session hijacking: Malicious actors can steal session cookies, allowing them to impersonate legitimate users.
- Server-side request forgery (SSRF): This can lead to unauthorized access to internal services, such as AWS metadata.
Patch Status
Microsoft has addressed this vulnerability in .NET 9.0.1 and 8.0.10+ as of October 2025. Users are strongly advised to upgrade their systems to mitigate the risks associated with this critical flaw.
Immediate Actions
To protect your systems from this vulnerability:
- Update to the latest version of ASP.NET as soon as possible.
- Do not run unverified payloads against production systems; use isolated environments for testing.
- Monitor your systems for any unusual activity, especially around authentication and session management.
This vulnerability highlights the importance of regular updates and vigilance in cybersecurity practices. Stay informed about the latest patches and security advisories to safeguard your applications.