Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Apache Software Foundation — Vulnerabilities & Security Advisories 1725

Browse all 1725 CVE security advisories affecting Apache Software Foundation. AI-powered Chinese analysis, POCs, and references for each vulnerability.

The Apache Software Foundation develops and maintains open-source software, primarily known for the widely deployed Apache HTTP Server and foundational Java frameworks. Its extensive portfolio exposes a significant attack surface, evidenced by the 1717 recorded CVEs. Historically, vulnerabilities frequently involve remote code execution, cross-site scripting, and privilege escalation, often stemming from complex configuration errors or input validation failures in legacy components. While the foundation enforces rigorous security review processes, the sheer volume of projects increases the likelihood of undiscovered flaws. Notable incidents include critical flaws in Log4j, which allowed remote code execution via crafted log messages, highlighting risks in dependency management. The organization relies on community-driven patching, requiring administrators to promptly apply updates to mitigate exploitation. This model ensures transparency but demands active vigilance from users to maintain system integrity against evolving threat vectors.

CVE IDTitleCVSSSeverityPublished
CVE-2024-42516 Apache HTTP Server: HTTP response splitting — Apache HTTP ServerCWE-20 5.3AIMediumAI2025-07-10
CVE-2025-27446 Apache APISIX Java Plugin Runner: Local listening file permissions in APISIX plugin runner allow a local attacker to elevate privileges — Apache APISIX Java Plugin RunnerCWE-732 7.8 -2025-07-06
CVE-2024-35164 Apache Guacamole: Improper input validation of console codes — Apache GuacamoleCWE-129 6.8 Medium2025-07-02
CVE-2025-46647 Apache APISIX: improper validation of issuer from introspection discovery url in plugin openid-connect — Apache APISIXCWE-302 7.5AIHighAI2025-07-02
CVE-2025-32897 Apache Seata (incubating): Deserialization of untrusted Data in Apache Seata Server — Apache Seata (incubating)CWE-502 9.8AICriticalAI2025-06-28
CVE-2025-50213 Apache Airflow Providers Snowflake: Potential SQL injection in CopyFromExternalStageToSnowflakeOperator — Apache Airflow Providers SnowflakeCWE-75 9.8AICriticalAI2025-06-24
CVE-2025-32896 Apache SeaTunnel: Unauthenticated insecure access — Apache SeaTunnelCWE-306 9.8AICriticalAI2025-06-19
CVE-2025-31698 Apache Traffic Server: Client IP address from PROXY protocol is not used for ACL — Apache Traffic ServerCWE-284--AI2025-06-19
CVE-2025-49763 Apache Traffic Server: Remote DoS via memory exhaustion in ESI Plugin — Apache Traffic ServerCWE-400 7.5AIHighAI2025-06-19
CVE-2025-48976 Apache Commons FileUpload, Apache Commons FileUpload: FileUpload DoS via part headers — Apache Commons FileUpload 7.5 -2025-06-16
CVE-2025-49124 Apache Tomcat: exe side-loading via icalcs.exe in Tomcat installer for Windows — Apache TomcatCWE-426 7.8AIHighAI2025-06-16
CVE-2025-49125 Apache Tomcat: Security constraint bypass for pre/post-resources — Apache TomcatCWE-288 9.1 -2025-06-16
CVE-2025-48988 Apache Tomcat: FileUpload large number of parts with headers DoS — Apache TomcatCWE-770 7.5 -2025-06-16
CVE-2025-47869 Apache NuttX RTOS: examples/xmlrpc: Fix calls buffers size. — Apache NuttX RTOSCWE-119 9.8AICriticalAI2025-06-16
CVE-2025-47868 Apache NuttX RTOS: tools/bdf-converter.: tools/bdf-converter: Fix loop termination condition. — Apache NuttX RTOS: tools/bdf-converter.CWE-787 9.8AICriticalAI2025-06-16
CVE-2025-30675 Apache CloudStack: Unauthorised template/ISO list access to the domain/resource admins — Apache CloudStackCWE-200 4.7 Medium2025-06-10
CVE-2025-22829 Apache CloudStack: Unauthorised access to dedicated resources in Quota plugin — Apache CloudStackCWE-269 4.3AIMediumAI2025-06-10
CVE-2025-26521 Apache CloudStack: CKS cluster in project exposes user API keys — Apache CloudStackCWE-200 7.5AIHighAI2025-06-10
CVE-2025-47849 Apache CloudStack: Insecure access of user's API/Secret Keys in the same domain — Apache CloudStackCWE-269 7.2AIHighAI2025-06-10
CVE-2025-47713 Apache CloudStack: Domain Admin can reset Admin password in Root Domain — Apache CloudStackCWE-269 7.2AIHighAI2025-06-10
CVE-2025-27817 Apache Kafka Client: Arbitrary file read and SSRF vulnerability — Apache Kafka Client 7.5 -2025-06-10
CVE-2025-27819 Apache Kafka: Possible RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration — Apache KafkaCWE-502 8.1 -2025-06-10
CVE-2025-27818 Apache Kafka: Possible RCE attack via SASL JAAS LdapLoginModule configuration — Apache KafkaCWE-502 8.1 -2025-06-10
CVE-2025-27531 Apache InLong: An arbitrary file read vulnerability for JDBC — Apache InLongCWE-502 6.5AIMediumAI2025-06-06
CVE-2025-46548 Apache Pekko Management, Apache Pekko Management, Apache Pekko Management, Akka Management, Akka Management, Akka Management: management API basic authentication is not effective — Apache Pekko ManagementCWE-287 9.8AICriticalAI2025-06-03
CVE-2025-48912 Apache Superset: Improper authorization bypass on row level security via SQL Injection — Apache SupersetCWE-89 6.5AIMediumAI2025-05-30
CVE-2025-46701 Apache Tomcat: Security constraint bypass for CGI scripts — Apache TomcatCWE-178 9.1AICriticalAI2025-05-29
CVE-2025-48734 Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum's declaredClass property by default — Apache Commons BeanUtils 1.xCWE-284 9.8AICriticalAI2025-05-28
CVE-2025-27528 Apache InLong: JDBC Vulnerability for Invisible Character Bypass Leading to Arbitrary File Read — Apache InLongCWE-502 7.5AIHighAI2025-05-28
CVE-2025-27526 Apache InLong: JDBC Vulnerability For URLEncode and backspace bypass — Apache InLongCWE-502 9.8AICriticalAI2025-05-28

This page lists every published CVE security advisory associated with Apache Software Foundation. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.