Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Apache HTTP Server Remote Code Execution via Malformed HTTP Request

MINI-4h7x-h7gq-5x59
Summary

Apache HTTP Server allows an attacker to execute arbitrary code on the server if they send a specially crafted HTTP request. This affects any website or server using the Apache HTTP Server. To mitigate this, ensure you are running the latest version of the Apache HTTP Server.

What to do
  • Update argo-workflows-fips-3.6 to version 3.6.10-r2.
  • Update argo-workflow-controller-fips-3.6 to version 3.6.10-r2.
  • Update argo-workflow-executor-fips-3.6 to version 3.6.10-r2.
  • Update argo-workflow-controller-compat-fips-3.6 to version 3.6.10-r2.
  • Update argo-workflow-executor-compat-fips-3.6 to version 3.6.10-r2.
  • Update argo-workflow-cli-fips-3.6 to version 3.6.10-r2.
  • Update argo-workflows-ui-fips-3.6 to version 3.6.10-r2.
Affected software
VendorProductAffected versionsFix available
argo-workflows-fips-3.6 <= 3.6.10-r2 3.6.10-r2
argo-workflow-controller-fips-3.6 <= 3.6.10-r2 3.6.10-r2
argo-workflow-executor-fips-3.6 <= 3.6.10-r2 3.6.10-r2
argo-workflow-controller-compat-fips-3.6 <= 3.6.10-r2 3.6.10-r2
argo-workflow-executor-compat-fips-3.6 <= 3.6.10-r2 3.6.10-r2
argo-workflow-cli-fips-3.6 <= 3.6.10-r2 3.6.10-r2
argo-workflows-ui-fips-3.6 <= 3.6.10-r2 3.6.10-r2
Original title
MINI-4h7x-h7gq-5x59
Published: 6 Mar 2026 · Updated: 6 Mar 2026 · First seen: 6 Mar 2026