Apache Apache The Apache Software Foundation

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Apache product.

RSS Feeds for Apache security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Apache products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Apache Sorted by Most Security Vulnerabilities since 2018

Apache HTTP Server294 vulnerabilities

Apache Tomcat176 vulnerabilities
JEE Compliant Servlet Container

Apache AirFlow156 vulnerabilities

Apache Traffic Server73 vulnerabilities

Apache Superset68 vulnerabilities

Apache OFBiz60 vulnerabilities

Apache OpenOffice54 vulnerabilities

Apache ActiveMQ49 vulnerabilities

Apache NiFi46 vulnerabilities

Apache CXF43 vulnerabilities

Apache Solr42 vulnerabilities
Search engine written in java

Apache Struts37 vulnerabilities

Apache Camel36 vulnerabilities

Apache InLong32 vulnerabilities

Apache CloudStack32 vulnerabilities

Apache DolphinScheduler27 vulnerabilities

Apache JSPWiki24 vulnerabilities

Apache Tika24 vulnerabilities

Apache Hive23 vulnerabilities

Apache Kafka22 vulnerabilities

Apache Zeppelin22 vulnerabilities

Apache Openmeetings22 vulnerabilities

Apache Kylin21 vulnerabilities

Apache Hadoop21 vulnerabilities

Apache Spark21 vulnerabilities

Apache Plusar20 vulnerabilities

Apache Geode19 vulnerabilities

Apache Fineract19 vulnerabilities

Apache Linkis18 vulnerabilities

Apache Log4j18 vulnerabilities

Apache Thrift18 vulnerabilities

Apache Iotdb18 vulnerabilities

Apache Streampark17 vulnerabilities

Apache Ambari17 vulnerabilities

Apache Shiro17 vulnerabilities

Apache Zookeeper17 vulnerabilities

Apache Hertzbeat16 vulnerabilities

Apache Cassandra16 vulnerabilities

Apache Activemq Artemis15 vulnerabilities

Apache James15 vulnerabilities

Apache JMeter14 vulnerabilities

Apache Syncope14 vulnerabilities

Apache Guacamole13 vulnerabilities

Apache Apisix13 vulnerabilities

Apache Druid13 vulnerabilities

Apache Subversion12 vulnerabilities

Apache Karaf12 vulnerabilities

Apache Archiva12 vulnerabilities

Apache Commons Compress12 vulnerabilities

Apache Answer11 vulnerabilities

Apache Ranger11 vulnerabilities

Apache Ozone11 vulnerabilities

Apache Wicket10 vulnerabilities

Apache Batik10 vulnerabilities

Apache Couchdb10 vulnerabilities

Apache Mesos9 vulnerabilities

Apache Storm9 vulnerabilities

Apache Portable Runtime9 vulnerabilities

Apache Pdfbox9 vulnerabilities

Apache Traffic Control8 vulnerabilities

Apache Mina8 vulnerabilities

Apache Ignite8 vulnerabilities

Apache Httpclient8 vulnerabilities

Apache Avro8 vulnerabilities

Apache Roller8 vulnerabilities

Apache Drill8 vulnerabilities

Apache Streampipes7 vulnerabilities

Apache Apr Util7 vulnerabilities

Apache Impala7 vulnerabilities

Apache Nuttx6 vulnerabilities

Apache Jena6 vulnerabilities

Apache Allura6 vulnerabilities

Apache Xerces C6 vulnerabilities

Apache Brpc6 vulnerabilities

Apache Commons Configuration6 vulnerabilities

Apache Commons Fileupload6 vulnerabilities

Apache Doris6 vulnerabilities

Apache Seata5 vulnerabilities

Apache Nimble5 vulnerabilities

Apache Poi5 vulnerabilities

Apache Submarine5 vulnerabilities

Apache Arrow5 vulnerabilities

Apache Atlas5 vulnerabilities

Apache Axis5 vulnerabilities

Apache Groovy5 vulnerabilities

Apache Kvrocks4 vulnerabilities

Apache RocketMQ4 vulnerabilities

Recent Apache Security Advisories

Advisory Title Published
2.4.67 11 Vulnerabilities Fixed in Apache HTTP Server 2.4.67 May 4, 2026
2.4.66 5 Vulnerabilities Fixed in Apache HTTP Server 2.4.66 December 4, 2025
2.4.65 Vulnerability Fixed in Apache HTTP Server 2.4.65 July 23, 2025
2.4.64 8 Vulnerabilities Fixed in Apache HTTP Server 2.4.64 July 10, 2025
2.4.62 2 Vulnerabilities Fixed in Apache HTTP Server 2.4.62 July 17, 2024
2.4.61 Vulnerability Fixed in Apache HTTP Server 2.4.61 July 16, 2024
2.4.60 8 Vulnerabilities Fixed in Apache HTTP Server 2.4.60 July 15, 2024
2.4.59 3 Vulnerabilities Fixed in Apache HTTP Server 2.4.59 April 4, 2024
2.4.58 4 Vulnerabilities Fixed in Apache HTTP Server 2.4.58 October 19, 2023
2.4.56 2 Vulnerabilities Fixed in Apache HTTP Server 2.4.56 March 7, 2023

Known Exploited Apache Vulnerabilities

The following Apache vulnerabilities have recently been marked by CISA as Known to be Exploited by threat actors.

Title Description Added
Apache ActiveMQ Improper Input Validation Vulnerability Apache ActiveMQ contains an improper input validation vulnerability that allows for code injection.
CVE-2026-34197 Exploit Probability: 6.2%
April 16, 2026
Apache HTTP Server Improper Escaping of Output Vulnerability Apache HTTP Server contains an improper escaping of output vulnerability in mod_rewrite that allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure.
CVE-2024-38475 Exploit Probability: 93.9%
May 1, 2025
Apache Tomcat Path Equivalence Vulnerability Apache Tomcat contains a path equivalence vulnerability that allows a remote attacker to execute code, disclose information, or inject malicious content via a partial PUT request.
CVE-2025-24813 Exploit Probability: 94.1%
April 1, 2025
Apache OFBiz Forced Browsing Vulnerability Apache OFBiz contains a forced browsing vulnerability that allows a remote attacker to obtain unauthorized access.
CVE-2024-45195 Exploit Probability: 94.1%
February 4, 2025
Apache HugeGraph-Server Improper Access Control Vulnerability Apache HugeGraph-Server contains an improper access control vulnerability that could allow a remote attacker to execute arbitrary code.
CVE-2024-27348 Exploit Probability: 94.3%
September 18, 2024
Apache OFBiz Incorrect Authorization Vulnerability Apache OFBiz contains an incorrect authorization vulnerability that could allow remote code execution via a Groovy payload in the context of the OFBiz user process by an unauthenticated attacker.
CVE-2024-38856 Exploit Probability: 94.4%
August 27, 2024
Apache OFBiz Path Traversal Vulnerability Apache OFBiz contains a path traversal vulnerability that could allow for remote code execution.
CVE-2024-32113 Exploit Probability: 94.0%
August 7, 2024
Apache Flink Improper Access Control Vulnerability Apache Flink contains an improper access control vulnerability that allows an attacker to read any file on the local filesystem of the JobManager through its REST interface.
CVE-2020-17519 Exploit Probability: 94.3%
May 23, 2024
Apache Superset Insecure Default Initialization of Resource Vulnerability Apache Superset contains an insecure default initialization of a resource vulnerability that allows an attacker to authenticate and access unauthorized resources on installations that have not altered the default configured SECRET_KEY according to installation instructions.
CVE-2023-27524 Exploit Probability: 84.0%
January 8, 2024
Apache ActiveMQ Deserialization of Untrusted Data Vulnerability Apache ActiveMQ contains a deserialization of untrusted data vulnerability that may allow a remote attacker with network access to a broker to run shell commands by manipulating serialized class types in the OpenWire protocol to cause the broker to instantiate any class on the classpath.
CVE-2023-46604 Exploit Probability: 94.4%
November 2, 2023
Apache RocketMQ Command Execution Vulnerability Several components of Apache RocketMQ, including NameServer, Broker, and Controller, are exposed to the extranet and lack permission verification. An attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as or achieve the same effect by forging the RocketMQ protocol content.
CVE-2023-33246 Exploit Probability: 94.4%
September 6, 2023
Apache Tomcat Remote Code Execution Vulnerability Apache Tomcat contains an unspecified vulnerability that allows for remote code execution if JmxRemoteLifecycleListener is used and an attacker can reach Java Management Extension (JMX) ports. This CVE exists because this listener wasn't updated for consistency with the Oracle patched issues for CVE-2016-3427 which affected credential types.
CVE-2016-8735 Exploit Probability: 93.8%
May 12, 2023
Apache Log4j2 Deserialization of Untrusted Data Vulnerability Apache Log4j2 contains a deserialization of untrusted data vulnerability due to the incomplete fix of CVE-2021-44228, where the Thread Context Lookup Pattern is vulnerable to remote code execution in certain non-default configurations.
CVE-2021-45046 Exploit Probability: 94.3%
May 1, 2023
Apache Spark Command Injection Vulnerability Apache Spark contains a command injection vulnerability via Spark User Interface (UI) when Access Control Lists (ACLs) are enabled.
CVE-2022-33891 Exploit Probability: 93.5%
March 7, 2023
Apache APISIX Authentication Bypass Vulnerability Apache APISIX contains an authentication bypass vulnerability that allows for remote code execution.
CVE-2022-24112 Exploit Probability: 94.4%
August 25, 2022
Apache CouchDB Insecure Default Initialization of Resource Vulnerability Apache CouchDB contains an insecure default initialization of resource vulnerability which can allow an attacker to escalate to administrative privileges.
CVE-2022-24706 Exploit Probability: 94.4%
August 25, 2022
Apache Kylin OS Command Injection Vulnerability Apache Kylin contains an OS command injection vulnerability which could permit an attacker to perform remote code execution.
CVE-2020-1956 Exploit Probability: 93.9%
March 25, 2022
Apache Struts Improper Input Validation Vulnerability Apache Struts allows remote attackers to execute arbitrary Object-Graph Navigation Language (OGNL) expressions.
CVE-2013-2251 Exploit Probability: 94.3%
March 25, 2022
Apache Tomcat on Windows Remote Code Execution Vulnerability When running Apache Tomcat on Windows with HTTP PUTs enabled, it is possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
CVE-2017-12615 Exploit Probability: 94.2%
March 25, 2022
Apache Tomcat Remote Code Execution Vulnerability When running Apache Tomcat, it is possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
CVE-2017-12617 Exploit Probability: 94.4%
March 25, 2022

Of the known exploited vulnerabilities above, 19 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings.

Top 10 Riskiest Apache Vulnerabilities

Based on the current exploit probability, these Apache vulnerabilities are on CISA's Known Exploited vulnerabilities list (KEV) and are ranked by the current EPSS exploit probability.

Rank CVE EPSS Vulnerability
1 CVE-2019-17558 94.5% Apache Solr 5.0.0-8.3.1 Remote Code Execution Vulnerability
2 CVE-2020-1938 94.5% Apache Tomcat Improper Privilege Management Vulnerability
3 CVE-2022-24112 94.4% Apache APISIX Authentication Bypass Vulnerability
4 CVE-2023-46604 94.4% Apache ActiveMQ Deserialization of Untrusted Data Vulnerability
5 CVE-2021-40438 94.4% Apache HTTP Server-Side Request Forgery (SSRF)
6 CVE-2018-11776 94.4% Apache Struts 2.3 to 2.3.34 and 2.5 to 2.5.16 Remote Code Execution Vulnerability
7 CVE-2021-42013 94.4% Apache HTTP Server 2.4.49 and 2.4.50 Path Traversal
8 CVE-2021-41773 94.4% Apache HTTP Server Path Traversal Vulnerability
9 CVE-2023-33246 94.4% Apache RocketMQ Command Execution Vulnerability
10 CVE-2017-12617 94.4% Apache Tomcat Remote Code Execution Vulnerability

By the Year

In 2026 there have been 223 vulnerabilities in Apache with an average score of 7.3 out of ten. Last year, in 2025 Apache had 229 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Apache in 2026 could surpass last years number. However, the average CVE base score of the vulnerabilities in 2026 is greater by 0.03.




Year Vulnerabilities Average Score
2026 223 7.32
2025 229 7.29
2024 275 7.45
2023 274 7.47
2022 228 7.63
2021 212 7.61
2020 160 7.61
2019 163 7.34
2018 155 7.24

It may take a day or so for new Apache vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Apache Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2026-27173 May 19, 2026
Airflow K8s Executor JWT Exposure via Pod Read-Only Access JWT tokens that were used by workers in Kubernetes Executors have been exposed to users who had read only access to Kuberentes Pods. This could allow users with just read-only access to perform actions that were only available to running tasks via Task SDK and potentially allow to modify state of Airflow Database for tasks.
AirFlow
CVE-2026-42526 May 19, 2026
Apache Airflow Providers: conn_id collision allows privileged access (9.27) In the AWS Secrets Manager and SSM Parameter Store secrets backends of `apache-airflow-providers-amazon` prior to 9.28.0, the team-scoping logic could resolve a `conn_id` containing a `/` (e.g. `"my_team/conn"`) to the same path as another team's team-scoped secret when the caller had no team context. A privileged caller without team context could therefore retrieve another team's secret by crafting a colliding `conn_id`. Fixed in 9.28.0 by switching the team-scope separator to `--` and rejecting team-shaped `conn_id`s when team context is absent. Affects the experimental multi-tenant teams feature only. Users are recommended to upgrade to `apache-airflow-providers-amazon` 9.28.0, which fixes the issue.
AirFlow
CVE-2026-47323 May 19, 2026
Apache Camel 3.x-4.x Header Injection via Inbound Filter Omission Camel-CXF and Camel-Knative Message Header Injection via Missing Inbound Filtering The CXF and Knative HeaderFilterStrategy implementations (CxfRsHeaderFilterStrategy in camel-cxf-rest, CxfHeaderFilterStrategy in camel-cxf-transport, and KnativeHttpHeaderFilterStrategy in camel-knative-http) only filter outbound Camel-internal headers via setOutFilterStartsWith, while not configuring inbound filtering via setInFilterStartsWith. As a result, an unauthenticated attacker can inject Camel-internal headers (e.g. CamelExecCommandExecutable, CamelFileName) via HTTP requests to CXF-RS or CXF-SOAP endpoints. When a route forwards messages from these endpoints to header-driven components such as camel-exec or camel-file, the injected headers override configured values, enabling remote code execution or arbitrary file writes. This is the same pattern that was previously addressed in camel-undertow (CVE-2025-30177), the broader incoming-header filter (CVE-2025-27636 and CVE-2025-29891), and non-HTTP strategies (CVE-2026-40453). This issue affects Apache Camel: from 3.18.0 before 4.14.6, from 4.15.0 before 4.18.2. Users are recommended to upgrade to version 4.19.0, which fixes the issue. If users are on the 4.18.x LTS releases stream, then they are suggested to upgrade to 4.18.2. If users are on the 4.14.x LTS releases stream, then they are suggested to upgrade to 4.14.6.
Camel
CVE-2026-46586 May 19, 2026
Apache OFBiz <=24.09.05 Code Injection & Eval Injection Improper Control of Generation of Code ('Code Injection'), Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-45434 May 19, 2026
Apache OFBiz <=24.09.05 Improper Auth via Password-Change RCE Improper Authentication vulnerability in Apache OFBiz via Password-Change Logic Flaw Leading to Remote Code Execution This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-45187 May 19, 2026
Apache OFBiz Webtools Improper Auth Pre-24.09.06 Improper Authorization vulnerability in Apache OFBiz Webtools. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-41919 May 19, 2026
Apache OFBiz LDAP Injection Vulnerability before 24.09.06 Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-35086 May 19, 2026
Apache OFBiz email services code injection before 24.09.06 Improper Control of Generation of Code ('Code Injection') vulnerability in email services of Apache OFBiz. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-31986 May 19, 2026
Apache OFBiz Hard-Coded Key CVE-2026-31986 (pre-24.09.06) Use of Hard-coded Cryptographic Key vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-31910 May 19, 2026
Apache OFBiz SSRF (before 24.09.06) Server-Side Request Forgery (SSRF) vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-31909 May 19, 2026
Apache OFBiz Sensitive Info Exposure (CVE-2026-31909) Before 24.09.06 Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-31906 May 19, 2026
Apache OFBiz XSS (CVE-2026-31906) before 24.09.06 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-31388 May 19, 2026
Apache OFBiz <24.09.06 Improper Access Control in Multi-tenant Deployments Improper Access Control vulnerability in Apache OFBiz in multi-tenant deployments. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-31387 May 19, 2026
Apache OFBiz IMPAUTH pre24.09.06 Improper Authentication vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-31380 May 19, 2026
Apache OFBiz <=24.09.05: EL Injection in Expression Language Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-31379 May 19, 2026
Apache OFBiz <v24.09.06 XSS/PATH_TRV/CII Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'), Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Control of Generation of Code ('Code Injection') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-31378 May 19, 2026
Apache OFBiz Improper Input Validation (before 24.09.06) Improper Input Validation vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-29226 May 19, 2026
Apache OFBiz before 24.09.06 SSRF via Content operations Server-Side Request Forgery (SSRF) vulnerability in Apache OFBiz via Content component operations. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-29207 May 19, 2026
Apache OFBiz <24.09.06 - Improper Neutralization in Template Engine Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue. Please note that in the updated version, "Data Resource" records with dataTemplateTypeId = "FTL" are no longer supported. Additionally, in the updated version, the "Ecommerce Customer" security group no longer includes content management grants. Users are advised to remove these permissions from any production site as well.
OFBiz
CVE-2026-29220 May 19, 2026
Apache OFBiz Path Traversal (before 24.09.06) Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 24.09.06. Users are recommended to upgrade to version 24.09.06, which fixes the issue.
OFBiz
CVE-2026-35194 May 15, 2026
Apache Flink SQLi 1.15-1.20.x,2.x prior 1.20.4/2.0.2 Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulnerability affects JSON functions (1.15.0+) and LIKE expressions with ESCAPE clauses (1.17.0+). User-controlled strings are interpolated into generated Java code without proper escaping, allowing attackers to break out of string literals and inject arbitrary expressions. Users are recommended to upgrade to either version 1.20.4, 2.0.2, 2.1.2 or 2.2.1, which fixes this issue.
Flink
CVE-2026-45205 May 14, 2026
Uncontrolled Recursion: Apache Commons Config 2.2-2.15 YAML StackOverflow Uncontrolled Recursion vulnerability in Apache Commons. When processing an untrusted configuration file, Commons Configuration will throw a StackOverflowError for YAML input with cycles. This issue affects Apache Commons: from 2.2 before 2.15.0. Users are recommended to upgrade to version 2.15.0, which fixes the issue.
Commons Configuration
CVE-2026-43515 May 12, 2026
Apache Tomcat Flaw via Multiple HTTP Methods (pre-9.0.118/10.1.55/11.0.22) Improper Authorization vulnerability when multiple method constraints define an HTTP method for the same extension in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109. Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118 which fix the issue.
Tomcat
CVE-2026-43514 May 12, 2026
Apache Tomcat AJP Secret Timing Attack before 11.0.22 (10.1.55, 9.0.118) Observable Timing Discrepancy vulnerability when comparing AJP secret in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109. Older unsupported versions may also be affected. Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118 which fix the issue.
Tomcat
CVE-2026-43513 May 12, 2026
LockOutRealm Case-Sensitivity Flaw in Tomcat 711 before Fix Improper Handling of Case Sensitivity vulnerability in LockOutRealm in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109. Older unsupported versions may also be affected. Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118 which fix the issue.
Tomcat
CVE-2026-43512 May 12, 2026
Apache Tomcat Auth Bypass via Digest Auth (<=9.0.117, 10.1.54, 11.0.21) DEPRECATED: Authentication Bypass Issues vulnerability in digest authentication in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 8.5.0 through 8.5.100, from before 7.0.0. Older unsupported versions any also be affect Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118 which fix the issue.
Tomcat
CVE-2026-41293 May 12, 2026
Apache Tomcat Improper Input Validation (v10-11.x) Improper Input Validation vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117, from 10.0.0-M1 through 10.0.27. Older, end of support versions may also be affected. Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.
Tomcat
CVE-2026-42498 May 12, 2026
HTTP Auth Header Leakage via WebSocket Auth in Apache Tomcat (V7-11) Exposure of HTTP Authentication Header to unexpected hosts during WebSocket authentication vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.2 through 9.0.117, from 8.5.24 through 8.5.100, from 7.0.83 through 7.0.109. Users are recommended to upgrade to version 11.0.22, 10.1.55 or 9.0.118, which fix the issue.
Tomcat
CVE-2026-41284 May 12, 2026
Apache Tomcat 11,10,9 Unbounded Resource Allocation VULN (fixed 11.0.22) Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.21, from 10.1.0-M1 through 10.1.54, from 9.0.0.M1 through 9.0.117. Older, unsupported versions may also be affected. Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.
Tomcat
CVE-2026-41018 May 11, 2026
Airflow Elasticsearch Provider logs credentials before 6.5.3 The Elasticsearch logging provider, when configured with a `host` URL that embeds credentials (for example `https://user:password@server.example.com:9200`), wrote the full host URL including the embedded credentials into task logs. Any user with task-log read permission could harvest the backend credentials. Users are advised to upgrade to `apache-airflow-providers-elasticsearch` 6.5.3 or later and, as a defense-in-depth measure, configure the backend credentials via a secret backend rather than embedding them in the `[elasticsearch] host` URL.
AirFlow
CVE-2026-43826 May 11, 2026
Apache Airflow Opensearch Provider <=1.9.0: Credentials Leak via Embedded URL The OpenSearch logging provider, when configured with a `host` URL that embeds credentials (for example `https://user:password@server.example.com:9200`), wrote the full host URL including the embedded credentials into task logs. Any user with task-log read permission could harvest the backend credentials. Users are advised to upgrade to `apache-airflow-providers-opensearch` 1.9.1 or later and, as a defense-in-depth measure, configure the backend credentials via a secret backend rather than embedding them in the `[opensearch] host` URL.
AirFlow
CVE-2026-39816 May 08, 2026
Apache NiFi 2.0.0-M1 to 2.8.0 Unrestricted TinkerpopClientService The optional extension component TinkerpopClientService is missing the Restricted annotation with the Execute Code Required Permission in Apache NiFi 2.0.0-M1 through 2.8.0. The TinkerpopClientService supports configuration of ByteCode Submission for the Script Submission Type, enabling Groovy Script execution in the service prior to submitting the query. The missing Restricted annotation allows users without the Execute Code Permission to configure the Service in installations that use fine-grained authorization and have the optional TinkerpopClientService installed. Apache NiFi installations that do not have the nifi-other-graph-services-nar installed are not subject to this vulnerability. Upgrading to Apache NiFi 2.9.0 is the recommended mitigation.
NiFi
CVE-2026-25199 May 08, 2026
Apache CloudStack 4.21-4.22: proxmox_vmid Enables Cross-Tenant Access Instances deployed via the Proxmox extension allow unauthorized access to instances belonging to other tenants. This issue affects Apache CloudStack: from 4.21.0.0 through 4.22.0.0. The Proxmox extension for CloudStack improperly uses a user-editable instance setting, proxmox_vmid, to associate CloudStack instances with Proxmox virtual machines. Because this value is not restricted or validated against tenant ownership and Proxmox VM IDs are predictable, a non-privileged attacker can modify the setting to reference a VM belonging to another account. This allows unauthorized cross-tenant access and enables full control over the targeted VM, including starting, stopping, and destroying the virtual machine. Users are recommended to upgrade to version 4.22.0.1, which fixes this issue. As a workaround for the existing installations, editing of the proxmox_vmid instance detail by users can be prevented by adding this detail name to the global configuration parameter - user.vm.denied.details.
CloudStack
CVE-2026-25077 May 08, 2026
Apache CloudStack <4.20.3.0/4.22.0.1: Template Upload RCE via Unsanitized Filenames Account users are allowed by default to register templates to be downloaded directly to the primary storage for deploying instances using the KVM hypervisor. Due to missing file name sanitization, an attacker can register malicious templates to execute arbitrary code on the KVM hosts. This can result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of the KVM-based infrastructure managed by CloudStack. Users are recommended to upgrade to Apache CloudStack versions 4.20.3.0 or 4.22.0.1, or later, which fixes this issue.
CloudStack
CVE-2025-69233 May 08, 2026
Apache CloudStack 4.20-4.22 DoS via TOCTOU race Due to multiple time-of-check time-of-use race conditions in the resource count check and increment logic, as well as missing validations, users of the platform are able to exceed the allocation limits configured for their accounts/domains. This can be used by an attacker to degrade the infrastructure's resources and lead to denial of service conditions. Users are recommended to upgrade to Apache CloudStack versions 4.20.3.0 or 4.22.0.1, or later, which fixes this issue.
CloudStack
CVE-2025-66467 May 08, 2026
Apache CloudStack <=4.20.2 Bucket Deletion Leak MinIO Access Keys Missing MinIO policy cleanup on bucket deletion via Apache CloudStack allows users to retain access to buckets which they previously owned. If another user creates a new bucket with the same name, the previous owners can gain unauthorized read and write access to it by using the previously generated access and secret keys. Users are recommended to upgrade to Apache CloudStack versions 4.20.3.0 or 4.22.0.1, or later, which fixes this issue.
CloudStack
CVE-2025-66172 May 08, 2026
CloudStack Backup Plugin 4.21/4.22 Improper Access: Volume Restore The CloudStack Backup plugin has an improper access logic in versions 4.21.0.0 and 4.22.0.0. Anyone with authenticated user-account access in CloudStack 4.21.0.0+ environments, where this plugin is enabled and have access to specific APIs can restore a volume from any other user's backups and attach the volume to their own VMs. Backup plugin users using CloudStack 4.21.0.0+ are recommended to upgrade to CloudStack version 4.22.0.1, which fixes this issue.
CloudStack
CVE-2025-66171 May 08, 2026
Apache CloudStack Plugin: Improper Access 4.21.0.0-4.22.0.0 Allows VM Creation The CloudStack Backup plugin has an improper access logic in versions 4.21.0.0 and 4.22.0.0. Anyone with authenticated user-account access in CloudStack 4.21.0.0+ environments, where this plugin is enabled and have access to specific APIs can create new VMs using backups of any other user of the environment. Backup plugin users using CloudStack 4.21.0.0+ are recommended to upgrade to CloudStack version 4.22.0.1, which fixes this issue.
CloudStack
CVE-2025-66170 May 08, 2026
Apache CloudStack Backup Plugin Improper Auth (4.21.0.0-4.22.0.0) The CloudStack Backup plugin has an improper authorization logic in versions 4.21.0.0 and 4.22.0.0. Anyone with authenticated user-account access in CloudStack 4.21.0.0+ environments, where this plugin is enabled and has access to specific APIs can list backups from any account in the environment. This vulnerability does not allow them to see the contents of the backup. Users are recommended to upgrade to version 4.22.0.1, which fixes the issue.
CloudStack
CVE-2026-40010 May 06, 2026
Apache Wicket sessionfixation via missing changeSessionId (v8.0.08.17.0,9.0.0,10.0.010.8.0) Missing invocation of Servlet http web request method changeSessionId after session binding can be exploited for a session fixation attack in Apache Wicket. This issue affects Apache Wicket: from 8.0.0 through 8.17.0, 9.0.0, from 10.0.0 through 10.8.0. Users are recommended to upgrade to version 10.9.0, which fixes the issue.
Wicket
CVE-2026-42509 May 06, 2026
Apache Wicket 8.0-8.17,9.0,10.0-10.8 XSS Vulnerability Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Wicket. This issue affects Apache Wicket: from 8.0.0 through 8.17.0, 9.0.0, from 10.0.0 through 10.8.0. Users are recommended to upgrade to version 10.9.0, which fixes the issue.
Wicket
CVE-2026-43646 May 06, 2026
Apache Wicket 8-10: Sensitive Info Exposure (CVE-2026-43646) Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Wicket. This issue affects Apache Wicket: from 8.0.0 through 8.17.0, from 9.0.0 through 9.22.0, from 10.0.0 through 10.8.0. Users are recommended to upgrade to version 10.9.0, which fixes the issue.
Wicket
CVE-2026-43975 May 06, 2026
Apache Wicket <10.9.0 File Upload Path Traversal via unsanitized uploadFieldId FolderUploadsFileManager in Apache Wicket does not validate or sanitize the uploadFieldId parameter or the clientFileName before constructing file paths, allowing an unauthenticated attacker to write arbitrary files outside the intended upload directory or read files from arbitrary locations on the server. This issue affects Apache Wicket: from 8.0.0 through 8.17.0, from 9.0.0 through 9.22.0, from 10.0.0 through 10.8.0. Users are recommended to upgrade to version 10.9.0, which fixes the issue.
Wicket
CVE-2026-28780 May 05, 2026
Apache HTTP Server 2.4.66 mod_proxy_ajp Heap Buffer Overflow (CVE-2026-28780) Heap-based Buffer Overflow vulnerability in mod_proxy_ajp of Apache HTTP Server. If mod_proxy_ajp connects to a malicious AJP server this AJP server can send a malicious AJP message back to mod_proxy_ajp and cause it to write 4 attacker controlled bytes after the end of a heap based buffer. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.
HTTP Server
CVE-2026-29168 May 05, 2026
Apache HTTP Server 2.4.30-2.4.66 mod_md OCSP Resource Exhaustion Vulnerability Allocation of Resources Without Limits or Throttling vulnerability in Apache HTTP Server's  mod_md via OCSP response data. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.
HTTP Server
CVE-2026-43868 May 05, 2026
Memory Allocation with Excessive Size in Apache Thrift < 0.23.0 (CVE-2026-43868) Memory Allocation with Excessive Size Value vulnerability in Apache Thrift. This issue affects Apache Thrift: before 0.23.0. Users are recommended to upgrade to version 0.23.0, which fixes the issue.
Thrift
CVE-2026-43870 May 05, 2026
Apache Thrift <0.23.0 PT, HTS, Resource Exhaustion - CVE-2026-43870 Origin Validation Error, Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting'), Uncontrolled Resource Consumption vulnerability in Apache Thrift. This issue affects Apache Thrift: before 0.23.0. Users are recommended to upgrade to version 0.23.0, which fixes the issue.
Thrift
CVE-2026-43869 May 05, 2026
Apache Thrift CVE-2026-43869: Improper Cert Host Mismatch before 0.23.0 Improper Validation of Certificate with Host Mismatch vulnerability in Apache Thrift. This issue affects Apache Thrift: before 0.23.0. Users are recommended to upgrade to version 0.23.0, which fixes the issue.
Thrift
CVE-2026-40682 May 04, 2026
Apache OpenNLP XXE via Unsanitized DictionaryParsing Before 2.5.9/Before 3.0.0-M3 XML External Entity (XXE) via Unsanitized Dictionary Parsing in Apache OpenNLP DictionaryEntryPersistor Versions Affected: before 2.5.9, before 3.0.0-M3 Description: The DictionaryEntryPersistor class initializes a static SAXParserFactory at class-load time without enabling FEATURE_SECURE_PROCESSING or disabling DTD processing. When create(InputStream, EntryInserter) is invoked, the only feature set on the XMLReader is namespace support external entity resolution and DOCTYPE declarations remain fully enabled. An attacker who can supply a crafted dictionary file (e.g., a stop-word list or domain dictionary) containing a malicious DOCTYPE declaration can trigger local file disclosure via file:// entity references or server-side request forgery via http:// entity references during SAX parsing, before the application processes a single dictionary entry. This is inconsistent with the project's own XmlUtil.createSaxParser() helper, which correctly sets FEATURE_SECURE_PROCESSING and disallow-doctype-decl and is used by all other XML parsing paths in the codebase. The public Dictionary(InputStream) constructor delegates directly to this method and is the documented API for loading user-supplied dictionaries, making untrusted input a realistic scenario. Mitigation: 2.x users should upgrade to 2.5.9. 3.x users should upgrade to 3.0.0-M3. Users who cannot upgrade immediately should ensure that all dictionary files are sourced from trusted origins and should consider wrapping the Dictionary(InputStream) constructor with input validation that rejects any XML containing a DOCTYPE declaration before it reaches the parser.
CVE-2026-42810 May 04, 2026
Apache Polaris 1.4.0 wildcard '*' in S3 IAM policies causes cross-table access Apache Polaris accepts literal `*` characters in namespace and table names. When it later builds temporary S3 access policies for delegated table access, those same characters appear to be reused unescaped in S3 IAM resource patterns and `s3:prefix` conditions. In S3 IAM policy matching, `*` is treated as a wildcard rather than as ordinary text. That means temporary credentials issued for one crafted table can match the storage path of a different table. In private testing against Polaris 1.4.0 using Polaris' AWS S3 temporary- credential path on both MinIO and real AWS S3, credentials returned for crafted tables such as `f*.t1`, `f*.*`, `*.*`, and `foo.*` could reach other tables' S3 locations. The confirmed behavior includes: - reading another table's metadata control file ([Iceberg metadata JSON]); - listing another table's exact S3 table prefix ([table prefix]); - and, when write delegation was returned for the crafted table, creating and deleting an object under another table's exact S3 table prefix. A control case using ordinary different names did not allow the same cross-table access. A least-privilege AWS S3 variant was also confirmed in which the attacker principal had no Polaris permissions on the victim table and only the minimal permissions required to create and use a crafted wildcard table (namespace-scoped `TABLE_CREATE` and `TABLE_WRITE_DATA` on `*`). In that setup, direct Polaris access to `foo.t1` remained forbidden, but the attacker could still create and load `*.*`, receive delegated S3 credentials, and use those credentials to list, read, create, and delete objects under `foo.t1`. In Iceberg, the metadata JSON file is a control file: it tells readers which data files belong to the table, which snapshots exist, and which table version to read. So unauthorized access to it is already a meaningful confidentiality problem. The confirmed write-capable variant means the issue is not limited to disclosure.
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.