Debian Apache2 vulnerabilities

242 known vulnerabilities affecting debian/apache2.

Total CVEs
242
CISA KEV
5
actively exploited
Public exploits
49
Exploited in wild
7
Severity breakdown
CRITICAL25HIGH66MEDIUM72LOW79

Vulnerabilities

Page 1 of 13
CVE-2025-23048CRITICALCVSS 9.1fixed in apache2 2.4.65-1~deb12u1 (bookworm)2025
CVE-2025-23048 [CRITICAL] CVE-2025-23048: apache2 - In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, a... In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertif
debian
CVE-2025-55753HIGHCVSS 7.5fixed in apache2 2.4.66-1~deb12u1 (bookworm)2025
CVE-2025-55753 [HIGH] CVE-2025-55753: apache2 - An integer overflow in the case of failed ACME certificate renewal leads, after ... An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds. This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66. Users are recommended to upgrade to version
debian
CVE-2025-49812HIGHCVSS 7.4fixed in apache2 2.4.65-1~deb12u1 (bookworm)2025
CVE-2025-49812 [HIGH] CVE-2025-49812: apache2 - In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63,... In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade
debian
CVE-2025-53020HIGHCVSS 7.5fixed in apache2 2.4.65-1~deb12u1 (bookworm)2025
CVE-2025-53020 [HIGH] CVE-2025-53020: apache2 - Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Ser... Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63. Users are recommended to upgrade to version 2.4.64, which fixes the issue. Scope: local bookworm: resolved (fixed in 2.4.65-1~deb12u1) bullseye: resolved (fixed in 2.4.65-1~deb11u1) forky: resolved (fixed in 2.4.64-1)
debian
CVE-2025-58098HIGHCVSS 8.3fixed in apache2 2.4.66-1~deb12u1 (bookworm)2025
CVE-2025-58098 [HIGH] CVE-2025-58098: apache2 - Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled an... Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives. This issue affects Apache HTTP Server before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue. Scope: local bookworm: resolved (fixed in 2.4.66-1~deb12u1) bu
debian
CVE-2025-49630HIGHCVSS 7.5fixed in apache2 2.4.65-1~deb12u1 (bookworm)2025
CVE-2025-49630 [HIGH] CVE-2025-49630: apache2 - In certain proxy configurations, a denial of service attack against Apache HTTP ... In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on". Scope: local bookworm: resolved (fixed in 2.4.65-1~
debian
CVE-2025-66200MEDIUMCVSS 5.4fixed in apache2 2.4.66-1~deb12u1 (bookworm)2025
CVE-2025-66200 [MEDIUM] CVE-2025-66200: apache2 - mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTT... mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid. This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65. Users are recommended to upgrade to version 2.4.66, which fixes the issue. Scope: l
debian
CVE-2025-65082MEDIUMCVSS 6.5fixed in apache2 2.4.66-1~deb12u1 (bookworm)2025
CVE-2025-65082 [MEDIUM] CVE-2025-65082: apache2 - Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in A... Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs. This issue affects Apache HTTP Server from 2.4.0 through 2.4.65. Users are recommended to upgrade to version 2.4.66 which fixes
debian
CVE-2025-59775LOWCVSS 7.52025
CVE-2025-59775 [HIGH] CVE-2025-59775: apache2 - Server-Side Request Forgery (SSRF) vulnerability  in Apache HTTP Server on Win... Server-Side Request Forgery (SSRF) vulnerability in Apache HTTP Server on Windows with AllowEncodedSlashes On and MergeSlashes Off allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.66, which fixes the issue. Scope: local bookworm: resolved bullseye: resolved forky:
debian
CVE-2025-54090LOWCVSS 6.3fixed in apache2 2.4.65-1 (forky)2025
CVE-2025-54090 [MEDIUM] CVE-2025-54090: apache2 - A bug in Apache HTTP Server 2.4.64 results in all "RewriteCond expr ..." tests e... A bug in Apache HTTP Server 2.4.64 results in all "RewriteCond expr ..." tests evaluating as "true". Users are recommended to upgrade to version 2.4.65, which fixes the issue. Scope: local bookworm: resolved bullseye: resolved forky: resolved (fixed in 2.4.65-1) sid: resolved (fixed in 2.4.65-1) trixie: resolved (fixed in 2.4.65-1)
debian
CVE-2024-38475CRITICALCVSS 9.1KEVPoCfixed in apache2 2.4.61-1~deb12u1 (bookworm)2024
CVE-2024-38475 [CRITICAL] CVE-2024-38475: apache2 - Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earl... Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variab
debian
CVE-2024-38474CRITICALCVSS 9.8fixed in apache2 2.4.61-1~deb12u1 (bookworm)2024
CVE-2024-38474 [CRITICAL] CVE-2024-38474: apache2 - Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earl... Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI. Users are recommended to upgrade to version 2.4.60, which fixes this issue. Some RewriteRule
debian
CVE-2024-38476CRITICALCVSS 9.8fixed in apache2 2.4.61-1~deb12u1 (bookworm)2024
CVE-2024-38476 [CRITICAL] CVE-2024-38476: apache2 - Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to... Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable. Users are recommended to upgrade to version 2.4.60, which fixes this issue. Scope: local bookworm: resolved (fixed in 2.4.61-1~deb12u1) bullseye: reso
debian
CVE-2024-38473HIGHCVSS 8.1PoCfixed in apache2 2.4.61-1~deb12u1 (bookworm)2024
CVE-2024-38473 [HIGH] CVE-2024-38473: apache2 - Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows re... Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. Users are recommended to upgrade to version 2.4.60, which fixes this issue. Scope: local bookworm: resolved (fixed in 2.4.61-1~deb12u1) bullseye: resolved (fixed
debian
CVE-2024-43204HIGHCVSS 7.5fixed in apache2 2.4.65-1~deb12u1 (bookworm)2024
CVE-2024-43204 [HIGH] CVE-2024-43204: apache2 - SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outb... SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this
debian
CVE-2024-47252HIGHCVSS 7.5fixed in apache2 2.4.65-1~deb12u1 (bookworm)2024
CVE-2024-47252 [HIGH] CVE-2024-47252: apache2 - Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4... Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed
debian
CVE-2024-39573HIGHCVSS 7.5fixed in apache2 2.4.61-1~deb12u1 (bookworm)2024
CVE-2024-39573 [HIGH] CVE-2024-39573: apache2 - Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an... Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue. Scope: local bookworm: resolved (fixed in 2.4.61-1~deb12u1) bullseye: resolved (fixed in 2.4.61-1~deb11u1) forky: res
debian
CVE-2024-38477HIGHCVSS 7.5fixed in apache2 2.4.61-1~deb12u1 (bookworm)2024
CVE-2024-38477 [HIGH] CVE-2024-38477: apache2 - null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier a... null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue. Scope: local bookworm: resolved (fixed in 2.4.61-1~deb12u1) bullseye: resolved (fixed in 2.4.61-1~deb11u1) forky: resolved (fixed in 2.4.60-1) sid: r
debian
CVE-2024-42516HIGHCVSS 7.3fixed in apache2 2.4.65-1~deb12u1 (bookworm)2024
CVE-2024-42516 [HIGH] CVE-2024-42516: apache2 - HTTP response splitting in the core of Apache HTTP Server allows an attacker who... HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue. Users are recommended to upgrad
debian
CVE-2024-27316HIGHCVSS 7.5fixed in apache2 2.4.59-1~deb12u1 (bookworm)2024
CVE-2024-27316 [HIGH] CVE-2024-27316: apache2 - HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 ... HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion. Scope: local bookworm: resolved (fixed in 2.4.59-1~deb12u1) bullseye: resolved (fixed in 2.4.59-1~deb11u1) forky: resolved (fixed in 2.4.59-1) sid: resolved
debian
1 / 13Next →
Debian Apache2 vulnerabilities | cvebase