
CVE-2025-53020 – Apache HTTP Server: HTTP/2 DoS by Memory Increase
https://notcve.org/view.php?id=CVE-2025-53020
10 Jul 2025 — Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63. Users are recommended to upgrade to version 2.4.64, which fixes the issue. • https://httpd.apache.org/security/vulnerabilities_24.html • CWE-401: Missing Release of Memory after Effective Lifetime •

CVE-2025-49812 – Apache HTTP Server: mod_ssl TLS upgrade attack
https://notcve.org/view.php?id=CVE-2025-49812
10 Jul 2025 — In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade. • https://httpd.apache.org/security/vulnerabilities_24.html • CWE-287: Improper Authentication •

CVE-2025-49630 – Apache HTTP Server: mod_proxy_http2 denial of service
https://notcve.org/view.php?id=CVE-2025-49630
10 Jul 2025 — In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on". In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_ht... • https://httpd.apache.org/security/vulnerabilities_24.html • CWE-617: Reachable Assertion •

CVE-2025-23048 – Apache HTTP Server: mod_ssl access control bypass with session resumption
https://notcve.org/view.php?id=CVE-2025-23048
10 Jul 2025 — In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHos... • https://httpd.apache.org/security/vulnerabilities_24.html • CWE-284: Improper Access Control •

CVE-2024-43394 – Apache HTTP Server: SSRF on Windows due to UNC paths
https://notcve.org/view.php?id=CVE-2024-43394
10 Jul 2025 — Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63. Note: The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. The server offers limited protection against administrators directing the server to open UNC paths. Windows se... • https://httpd.apache.org/security/vulnerabilities_24.html • CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2024-47252 – Apache HTTP Server: mod_ssl error log variable escaping
https://notcve.org/view.php?id=CVE-2024-47252
10 Jul 2025 — Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files. • https://httpd.apache.org/security/vulnerabilities_24.html • CWE-150: Improper Neutralization of Escape, Meta, or Control Sequences •

CVE-2024-43204 – Apache HTTP Server: SSRF with mod_headers setting Content-Type header
https://notcve.org/view.php?id=CVE-2024-43204
10 Jul 2025 — SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue. • https://httpd.apache.org/security/vulnerabilities_24.html • CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2024-42516 – Apache HTTP Server: HTTP response splitting
https://notcve.org/view.php?id=CVE-2024-42516
10 Jul 2025 — HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue. Users are recommended to upgrade to version 2.4.64, which fixes this issue. • https://httpd.apache.org/security/vulnerabilities_24.html • CWE-20: Improper Input Validation •

CVE-2024-40725 – Apache HTTP Server: source code disclosure with handlers configured via AddType
https://notcve.org/view.php?id=CVE-2024-40725
18 Jul 2024 — A partial fix for CVE-2024-39884 in the core of Apache HTTP Server 2.4.61 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted. Users are recommended to upgrade to version 2.4.62, which fixes this issue. Una solución parcial para CVE-2024-39884 en el núcleo de Apache HTTP Se... • https://packetstorm.news/files/id/183252 • CWE-668: Exposure of Resource to Wrong Sphere •

CVE-2024-40898 – Apache HTTP Server: SSRF with mod_rewrite in server/vhost context on Windows
https://notcve.org/view.php?id=CVE-2024-40898
18 Jul 2024 — SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests. Users are recommended to upgrade to version 2.4.62 which fixes this issue. SSRF en el servidor Apache HTTP en Windows con mod_rewrite en el contexto de servidor/vhost, permite potencialmente filtrar hashes NTML a un servidor malicioso a través de SSRF y solicitudes maliciosas. Se recomienda a los usuarios actualizar a la versión 2.4.62,... • https://github.com/TAM-K592/CVE-2024-40725-CVE-2024-40898 • CWE-918: Server-Side Request Forgery (SSRF) •