Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Apache HTTP Server: Malicious Files Can Be Executed Remotely

MINI-4jcw-29m7-pv83
Summary

Apache's HTTP Server may allow an attacker to execute malicious files on a server, potentially leading to unauthorized access or data theft. This is because the server does not properly validate user input, allowing a potential attack vector. To protect against this, ensure that your Apache HTTP Server is updated to the latest version and that you validate user input carefully.

What to do
  • Update keycloak-fips to version 26.5.5-r0.
  • Update keycloak-fips-doc to version 26.5.5-r0.
  • Update keycloak-fips-advanced-compat to version 26.5.5-r0.
Affected software
VendorProductAffected versionsFix available
keycloak-fips <= 26.5.5-r0 26.5.5-r0
keycloak-fips-doc <= 26.5.5-r0 26.5.5-r0
keycloak-fips-advanced-compat <= 26.5.5-r0 26.5.5-r0
Original title
MINI-4jcw-29m7-pv83
Published: 7 Mar 2026 · Updated: 13 Mar 2026 · First seen: 7 Mar 2026