Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Apache HTTP Server allows unauthorized code execution

OESA-2026-1592
Summary

Apache's web server has a security issue that could let attackers execute unauthorized code on your server. This affects all versions of Apache from 2.4.0 to 2.4.65. To stay safe, upgrade to version 2.4.66 as soon as possible.

What to do
  • Update httpd to version 2.4.51-27.oe2203sp4.
Affected software
VendorProductAffected versionsFix available
– httpd <= 2.4.51-27.oe2203sp4 2.4.51-27.oe2203sp4
Original title
httpd security update
Original description
Apache HTTP Server is a powerful and flexible HTTP/1.1 compliant web server.

Security Fix(es):

Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=&quot;...&quot; directives.

This issue affects Apache HTTP Server before 2.4.66.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.(CVE-2025-58098)

Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.

This issue affects Apache HTTP Server from 2.4.0 through 2.4.65.

Users are recommended to upgrade to version 2.4.66 which fixes the issue.(CVE-2025-65082)

mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.

This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.(CVE-2025-66200)
Published: 15 Mar 2026 · Updated: 15 Mar 2026 · First seen: 15 Mar 2026