Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-66373

EPSS 0.03% · P8
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-66373

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Akamai Ghost on Akamai CDN edge servers before 2025-11-17 has a chunked request body processing error that can result in HTTP request smuggling. When Akamai Ghost receives an invalid chunked body that includes a chunk size different from the actual size of the following chunk data, under certain circumstances, Akamai Ghost erroneously forwards the invalid request and subsequent superfluous bytes to the origin server. An attacker could hide a smuggled request in these superfluous bytes. Whether this is exploitable depends on the origin server's behavior and how it processes the invalid request it receives from Akamai Ghost.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Akamai Ghost 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Akamai Ghost是美国Akamai公司的一个HTTP服务程序。 Akamai Ghost 2025-11-17之前版本存在安全漏洞,该漏洞源于分块请求体处理错误,可能导致HTTP请求夹带。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2025-66373

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-66373

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-12-04 · 32 CVEs total

CVE-2025-140124.7 MEDIUMJIZHICMS Batch Delete Comments deleteAll.html delete sql injection
CVE-2025-140114.7 MEDIUMJIZHICMS Add Display Name Field addcomment.html commentlist sql injection
CVE-2025-140132.4 LOWJIZHICMS Comment addcomment.html cross site scripting
CVE-2025-63364Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-65899Kalmia 安全漏洞
CVE-2025-63363Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-63361Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-63362Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-65637Logrus 安全漏洞
CVE-2025-65806e-point CMS 安全漏洞
CVE-2025-29268ALLNET ALL-RUT22GW v3.3.8 安全漏洞
CVE-2025-29269ALLNET ALL-RUT22GW 安全漏洞
CVE-2025-65883Genexis Platinum P4410 安全漏洞
CVE-2025-63499SOGo 安全漏洞
CVE-2025-63896JXL 9 Inch Car Android Double Din Player 安全漏洞
CVE-2025-55948X-SpringBoot 安全漏洞
CVE-2025-65900Kalmia 安全漏洞
CVE-2025-65516Seafile Community Edition 安全漏洞
CVE-2025-61148EduplusCampus 安全漏洞
CVE-2025-57210Weitong Mall 安全漏洞

Showing top 20 of 32 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-66373

No comments yet


Leave a comment