[CIVN-2026-0221] Multiple Vulnerabilities in Apache HTTP Server

By Published On: May 7, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Apache HTTP Server


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)



Severity Rating: HIGH


Software Affected


Apache HTTP Server versions prior to 2.4.67

Overview


Multiple vulnerabilities have been reported in Apache HTTP Server which could be exploited by an attacker to execute arbitrary code, bypass security restrictions, disclose sensitive information, escalate privileges, or cause denial of service (DoS) condition on the targeted system.


Target Audience:

System administrators, DevOps teams and organizations managing Apache HTTP Server.


Risk Assessment:

High risk of unauthorized access to sensitive data, bypass of security controls, possible remote code execution, privilege escalation, or disruption of services.


Impact Assessment:

Potential for arbitrary code execution, sensitive information disclosure, privilege escalation, system compromise, or service disruption.


Description


Apache HTTP Server is an open-source web server platform widely used for hosting web applications and websites, known for its reliability, performance, and cross-platform support.


Multiple vulnerabilities exist in Apache HTTP Server due to improper memory handling, insufficient access control, improper validation of HTTP/AJP responses, unrestricted resource allocation, and timing-based authentication weakness in various components.


Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, bypass security restrictions, disclose sensitive information, escalate privileges, or cause denial of service (DoS) condition on the targeted system.


Solution


Apply appropriate updates as mentioned by the vendor:

https://httpd.apache.org/security/vulnerabilities_24.html



Vendor Information


Apache HTTP Server

https://httpd.apache.org/security/vulnerabilities_24.html


References


Apache HTTP Server

https://httpd.apache.org/security/vulnerabilities_24.html


CVE Name

CVE-2026-23918

CVE-2026-24072

CVE-2026-28780

CVE-2026-29168

CVE-2026-29169

CVE-2026-33006

CVE-2026-33007

CVE-2026-33523

CVE-2026-33857

CVE-2026-34032

CVE-2026-34059




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmn8pRMACgkQ3jCgcSdc

ys/uUg//fpetrJFqXCODzuxh+1AGV3f9bg5S+TY2ZO9WlRuheE38QW4Sg5ZEBz+t

tRmSAF4fGAmxIFT4einsRlNO93dBqIaXqQEf6GJGXNfDZ/YLA5m7+GTIYpgev8sv

zwzx9+CSERomFpHaBJ8PfYDgSvfcvvr58M6x4FQpRRmTzvubMkzZydMdJZpMz0/F

+cCLNFmov/wUui+//s2PU6IZE3ldE8tr22aDmHABypFhjpmFzq2O6Spy5CRV1NLL

QTxcmCqfWs6RS+jZpWCSpwRWpUnqgd5DXTxNxfIDpm992PICKV1Q+WfZ2mf20LY8

39C2/jKwVMZOr4WTh00xV0KNxTsQHse5599OOQPqGpOfV6Rsc+xM7Vmg9bq09qE/

VKlY3UUM/KB9bX/X5RSmH5Gy1IaSncGeM1u6FW1zS4X4i9zPaZyNo50KUUnBnvv5

MvdbL7XR9WW5RfzAIC+wFZ48SsUkZCKRfZKeJJS16byKtfJQK39N2sGYDffH+Ney

kCm2/MTml7cM8YGipzegEuS1tlUm5iCYAil305lvR0HXzo/V8mGm7eKVsENAZFp5

H4tUUgbAbaDCNQiiWLRiOFkx3IU4578NvT1c5+esg68yqRbCr3GFptT1hmqpv59I

FvurE4YuobFjNfLFSUlkzQHzLasIsML5Ne+Ra52rWR4jo7dFq+4=

=jV7i

—–END PGP SIGNATURE—–

Share this article