Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
Apache HTTP Server Unauthenticated Remote Code Execution Vulnerability
CGA-pxg7-m349-gccx
Summary
An attacker can execute arbitrary code on the server without a password, potentially allowing them to gain control of the system. This could lead to data theft, disruption of services, or other malicious activities. Affected systems should be updated to the latest version of the Apache HTTP Server as soon as possible to prevent exploitation.
What to do
- Update chainguard tritonserver-backend-vllm-cuda-12.9 to version 25.9.0_git20260318-r0.
- Update chainguard tritonserver-backend-vllm-cuda-13.0 to version 25.11-r2.
- Update chainguard vllm-openai-cuda-12.9 to version 0.17.1-r1.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| chainguard | tritonserver-backend-vllm-cuda-12.9 | <= 25.9.0_git20260318-r0 | 25.9.0_git20260318-r0 |
| chainguard | tritonserver-backend-vllm-cuda-13.0 | <= 25.11-r2 | 25.11-r2 |
| chainguard | vllm-openai-cuda-12.9 | <= 0.17.1-r1 | 0.17.1-r1 |
Original title
CGA-pxg7-m349-gccx
Published: 27 Mar 2026 · Updated: 27 Mar 2026 · First seen: 27 Mar 2026