F5 Networks Http Server
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in F5 Networks Http Server.
Recent F5 Networks Http Server Security Advisories
| Advisory | Title | Published |
|---|---|---|
| K000159017 | K000159017: Apache HTTP Server vulnerability CVE-2025-3891 | January 8, 2026 |
| K000158206 | K000158206: Apache HTTP Server vulnerability CVE-2025-66200 | December 15, 2025 |
| K000158042 | K000158042: Apache HTTP server vulnerabilities CVE-2024-47252 and CVE-2025-49812 | December 3, 2025 |
| K000153074 | K000153074: Apache HTTP server vulnerability CVE-2024-42516 | August 21, 2025 |
| K000152924 | K000152924: Apache HTTP Server vulnerability CVE-2024-43204 | August 8, 2025 |
| K000152922 | K000152922: Apache HTTP server vulnerability CVE-2025-49630 | August 8, 2025 |
| K000152594 | K000152594: Apache HTTP server vulnerability CVE-2024-43394 | July 16, 2025 |
| K000151646 | K000151646: Apache HTTP server vulnerability CVE-2025-31492 | June 2, 2025 |
| K000140693 | K000140693: Apache HTTP server vulnerability CVE-2024-39573 | August 13, 2024 |
| K000132643 | K000132643 : Apache HTTP server vulnerability CVE-2022-36760 | April 14, 2023 |
By the Year
In 2026 there have been 0 vulnerabilities in F5 Networks Http Server. Last year, in 2025 Http Server had 9 security vulnerabilities published. Right now, Http Server is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 9 | 7.23 |
| 2024 | 1 | 7.50 |
It may take a day or so for new Http Server vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent F5 Networks Http Server Security Vulnerabilities
Apache HTTP Server 2.4.765 AllowOverride FileInfo Bypass
CVE-2025-66200
5.4 - Medium
- December 05, 2025
mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid. This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
Authentication Bypass Using an Alternate Path or Channel
Apache HTTP Server SSRF via mod_rewrite/expressions (2.4.0-2.4.63)
CVE-2024-43394
7.5 - High
- July 10, 2025
Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63. Note: The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. The server offers limited protection against administrators directing the server to open UNC paths. Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication.
SSRF
Apache HTTP Server 2.4.x SSRF via mod_proxy+mod_headers (before 2.4.64)
CVE-2024-43204
7.5 - High
- July 10, 2025
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.
SSRF
Apache HTTP Server 2.4.x: mod_proxy_http2 assertion triggers DoS via proxy
CVE-2025-49630
7.5 - High
- July 10, 2025
In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".
assertion failure
Apache HTTP Server 2.4.64+ fixes HTTP response splitting in core
CVE-2024-42516
7.5 - High
- July 10, 2025
HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue. Users are recommended to upgrade to version 2.4.64, which fixes this issue.
Improper Input Validation
Apache HTTP Server 2.4.63 mod_ssl log injection via unsanitized SSL var
CVE-2024-47252
7.5 - High
- July 10, 2025
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.
Improper Neutralization of Escape, Meta, or Control Sequences
Apache HTTP Server 2.4.63 & earlier mod_ssl: HTTP Desync via TLS Upgrade
CVE-2025-49812
7.4 - High
- July 10, 2025
In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.
authentification
Apache mod_auth_openidc POST Crash via OIDCPreservePost
CVE-2025-3891
7.5 - High
- April 29, 2025
A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty POST request when the OIDCPreservePost directive is enabled. The server crashes consistently, affecting availability.
Uncaught Exception
mod_auth_openidc <=2.4.16.10 OpenID Auth Module Disclosure
CVE-2025-31492
- April 06, 2025
mod_auth_openidc is an OpenID Certified authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. Prior to 2.4.16.11, a bug in a mod_auth_openidc results in disclosure of protected content to unauthenticated users. The conditions for disclosure are an OIDCProviderAuthRequestMethod POST, a valid account, and there mustn't be any application-level gateway (or load balancer etc) protecting the server. When you request a protected resource, the response includes the HTTP status, the HTTP headers, the intended response (the self-submitting form), and the protected resource (with no headers). This is an example of a request for a protected resource, including all the data returned. In the case where mod_auth_openidc returns a form, it has to return OK from check_userid so as not to go down the error path in httpd. This means httpd will try to issue the protected resource. oidc_content_handler is called early, which has the opportunity to prevent the normal output being issued by httpd. oidc_content_handler has a number of checks for when it intervenes, but it doesn't check for this case, so the handler returns DECLINED. Consequently, httpd appends the protected content to the response. The issue has been patched in mod_auth_openidc versions >= 2.4.16.11.
Information Disclosure
Apache HTTP Server mod_rewrite SSRF before 2.4.60 via mod_proxy
CVE-2024-39573
7.5 - High
- July 01, 2024
Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
Improper Input Validation
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for F5 Networks Http Server or by F5 Networks? Click the Watch button to subscribe.