Apache Software Foundation Apache Http Server vulnerabilities
96 known vulnerabilities affecting apache_software_foundation/apache_http_server.
Total CVEs
96
CISA KEV
5
actively exploited
Public exploits
14
Exploited in wild
6
Severity breakdown
CRITICAL22HIGH52MEDIUM22
Vulnerabilities
Page 1 of 5
CVE-2025-55753HIGHCVSS 7.5≥ 2.4.30, < 2.4.662025-12-05
CVE-2025-55753 [HIGH] CWE-190 CVE-2025-55753: An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures
An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.
This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.
Users are recommended to u
cvelistv5nvd
CVE-2025-59775HIGHCVSS 7.5≥ 2.4.0, ≤ 2.4.652025-12-05
CVE-2025-59775 [HIGH] CWE-918 CVE-2025-59775: Server-Side Request Forgery (SSRF) vulnerability
in Apache HTTP Server on Windows
with AllowEnc
Server-Side Request Forgery (SSRF) vulnerability
in Apache HTTP Server on Windows
with AllowEncodedSlashes On and MergeSlashes Off allows to potentially leak NTLM
hashes to a malicious server via SSRF and malicious requests or content
Users are recommended to upgrade to version 2.4.66, which fixes the issue.
cvelistv5nvd
CVE-2025-58098HIGHCVSS 8.3fixed in 2.4.662025-12-05
CVE-2025-58098 [HIGH] CWE-201 CVE-2025-58098: Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not
Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives.
This issue affects Apache HTTP Server before 2.4.66.
Users are recommended to upgrade to version 2.4.66, which fixes the issue.
cvelistv5nvd
CVE-2025-65082MEDIUMCVSS 6.5≥ 2.4.0, ≤ 2.4.652025-12-05
CVE-2025-65082 [MEDIUM] CWE-150 CVE-2025-65082: Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server th
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.
This issue affects Apache HTTP Server from 2.4.0 through 2.4.65.
Users are recommended to upgrade to version 2
cvelistv5nvd
CVE-2025-66200MEDIUMCVSS 5.4≥ 2.4.7, ≤ 2.4.652025-12-05
CVE-2025-66200 [MEDIUM] CWE-288 CVE-2025-66200: mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with
mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.
This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.
Users are recommended to upgrade to version 2.4.66, which fixes th
cvelistv5nvd
CVE-2025-54090MEDIUMCVSS 6.3v2.4.642025-07-23
CVE-2025-54090 [MEDIUM] CWE-253 CVE-2025-54090: A bug in Apache HTTP Server 2.4.64 results in all "RewriteCond expr ..." tests evaluating as "true".
A bug in Apache HTTP Server 2.4.64 results in all "RewriteCond expr ..." tests evaluating as "true".
Users are recommended to upgrade to version 2.4.65, which fixes the issue.
cvelistv5nvd
CVE-2025-23048CRITICALCVSS 9.1≥ 2.4.35, ≤ 2.4.632025-07-10
CVE-2025-23048 [CRITICAL] CWE-284 CVE-2025-23048: In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control byp
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption.
Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a diffe
cvelistv5nvd
CVE-2024-43394HIGHCVSS 7.5≥ 2.4.0, ≤ 2.4.632025-07-10
CVE-2024-43394 [HIGH] CWE-918 CVE-2024-43394: Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM
Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via
mod_rewrite or apache expressions that pass unvalidated request input.
This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63.
Note: The Apache HTTP Server Project will be setting a higher bar for accepting vu
cvelistv5nvd
CVE-2025-49812HIGHCVSS 7.4≤ 2.4.632025-07-10
CVE-2025-49812 [HIGH] CWE-287 CVE-2025-49812: In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchroni
In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade.
Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support
cvelistv5nvd
CVE-2024-43204HIGHCVSS 7.5≥ 2.4.0, ≤ 2.4.632025-07-10
CVE-2024-43204 [HIGH] CWE-918 CVE-2024-43204: SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request.
Users are recommended to upgrade to version 2.4.64 w
cvelistv5nvd
CVE-2024-47252HIGHCVSS 7.5≥ 2.4, ≤ 2.4.632025-07-10
CVE-2024-47252 [HIGH] CWE-150 CVE-2024-47252: Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allo
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations.
In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escapi
cvelistv5nvd
CVE-2025-53020HIGHCVSS 7.5≥ 2.4.17, ≤ 2.4.632025-07-10
CVE-2025-53020 [HIGH] CWE-401 CVE-2025-53020: Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server.
This issue aff
Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server.
This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63.
Users are recommended to upgrade to version 2.4.64, which fixes the issue.
cvelistv5nvd
CVE-2025-49630HIGHCVSS 7.5≥ 2.4.26, ≤ 2.4.632025-07-10
CVE-2025-49630 [HIGH] CWE-617 CVE-2025-49630: In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.
In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2.
Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".
cvelistv5nvd
CVE-2024-42516HIGHCVSS 7.3≥ 2.4.0, ≤ 2.4.632025-07-10
CVE-2024-42516 [HIGH] CWE-20 Apache HTTP Server: HTTP response splitting
Apache HTTP Server: HTTP response splitting
HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response.
This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue.
Users are recommended to upgrade to version
cvelistv5
CVE-2024-40898HIGHCVSS 7.5≥ 2.4.0, ≤ 2.4.612024-07-18
CVE-2024-40898 [HIGH] CWE-918 CVE-2024-40898: SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentiall
SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests.
Users are recommended to upgrade to version 2.4.62 which fixes this issue.
cvelistv5nvd
CVE-2024-40725MEDIUMCVSS 6.2≥ 2.4.60, ≤ 2.4.612024-07-18
CVE-2024-40725 [MEDIUM] CWE-668 Apache HTTP Server: source code disclosure with handlers configured via AddType
Apache HTTP Server: source code disclosure with handlers configured via AddType
A partial fix for CVE-2024-39884 in the core of Apache HTTP Server 2.4.61 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For e
cvelistv5
CVE-2024-39884MEDIUMCVSS 6.2≥ 2.4.60, ≤ 2.4.612024-07-04
CVE-2024-39884 [MEDIUM] CWE-668 CVE-2024-39884: A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type ba
A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted.
Users
cvelistv5nvd
CVE-2024-38475CRITICALCVSS 9.1KEVPoC≥ 2.4.0, ≤ 2.4.592024-07-01
CVE-2024-38475 [CRITICAL] CWE-116 CVE-2024-38475: Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attack
Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure.
Substitutions in server context that use a backrefe
cvelistv5nvd
CVE-2024-38476CRITICALCVSS 9.8≥ 2.4.0, ≤ 2.4.592024-07-01
CVE-2024-38476 [CRITICAL] CWE-829 CVE-2024-38476: Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclos
Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.
cvelistv5nvd
CVE-2024-38474CRITICALCVSS 9.8≥ 2.4.0, ≤ 2.4.592024-07-01
CVE-2024-38474 [CRITICAL] CWE-116 CVE-2024-38474: Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker
Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in
directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.
cvelistv5nvd
1 / 5Next →