SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request.

Users are recommended to upgrade to version 2.4.64 which fixes this issue.

Published: 2025-07-10

CVSS: 7.5

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Download CVE-2024-43204 POC (Proof-of-Concept) here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

https://connollyfinan.ie/poc-597-cve-2017-1000253/

https://connollyfinan.ie/poc-18-cve-2025-11002/

https://connollyfinan.ie/poc-251-cve-2025-55184/

https://connollyfinan.ie/poc-71-cve-2019-14287/