Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Apache Software Foundation — Vulnerabilities & Security Advisories 1725

Browse all 1725 CVE security advisories affecting Apache Software Foundation. AI-powered Chinese analysis, POCs, and references for each vulnerability.

The Apache Software Foundation develops and maintains open-source software, primarily known for the widely deployed Apache HTTP Server and foundational Java frameworks. Its extensive portfolio exposes a significant attack surface, evidenced by the 1717 recorded CVEs. Historically, vulnerabilities frequently involve remote code execution, cross-site scripting, and privilege escalation, often stemming from complex configuration errors or input validation failures in legacy components. While the foundation enforces rigorous security review processes, the sheer volume of projects increases the likelihood of undiscovered flaws. Notable incidents include critical flaws in Log4j, which allowed remote code execution via crafted log messages, highlighting risks in dependency management. The organization relies on community-driven patching, requiring administrators to promptly apply updates to mitigate exploitation. This model ensures transparency but demands active vigilance from users to maintain system integrity against evolving threat vectors.

CVE IDTitleCVSSSeverityPublished
CVE-2026-33857 Apache HTTP Server: Off-by-one OOB reads in AJP getter functions — Apache HTTP ServerCWE-125 7.5AIHighAI2026-05-04
CVE-2026-34032 Apache HTTP Server: mod_proxy_ajp: Heap Buffer Over-Read Due to Missing Null-Termination Check (ajp_msg_get_string) — Apache HTTP ServerCWE-170 9.1AICriticalAI2026-05-04
CVE-2026-34059 Apache HTTP Server: mod_proxy_ajp: Heap Over-Read and memory disclosure in ajp_parse_data() — Apache HTTP ServerCWE-126 7.5AIHighAI2026-05-04
CVE-2026-24072 Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr — Apache HTTP ServerCWE-269 5.5AIMediumAI2026-05-04
CVE-2026-42778 Apache MINA: CWE-502 Deserialization of Untrusted Data (take 2) — Apache MINACWE-502 9.8 Critical2026-05-01
CVE-2026-42779 Apache MINA: AbstractIoBuffer.resolveClass() null-clazz Branch Skips acceptMatchers Filter — Full Object Deserialization RCE (take 2) — Apache MINACWE-502 9.8 Critical2026-05-01
CVE-2026-42404 Apache Neethi: Unrestricted HTTP Redirect Following in Policy References — Apache NeethiCWE-918 6.5 Medium2026-05-01
CVE-2026-42402 Apache Neethi: Policy Normalization Unbounded Resource Allocation DoS — Apache NeethiCWE-400 7.5 High2026-05-01
CVE-2026-42403 Apache Neethi: Circular Policy Reference Infinite Loop — Apache NeethiCWE-400 7.5 High2026-05-01
CVE-2026-41016 Apache Airflow Providers SMTP: No certificate validation on SMTP STARTTLS connections in SMTP provider — Apache Airflow Providers SMTPCWE-295 7.4AIHighAI2026-04-30
CVE-2026-41873 Pony Mail: Admin account takeover via request smuggling — Pony MailCWE-444 9.8AICriticalAI2026-04-28
CVE-2026-41636 Apache Thrift: Node.js skip() recursion — Apache ThriftCWE-674 7.5AIHighAI2026-04-28
CVE-2026-41607 Apache Thrift: C++ JSON OOB read — Apache ThriftCWE-125 7.5AIHighAI2026-04-28
CVE-2026-41606 Apache Thrift: c_glib dispatch stack overflow — Apache ThriftCWE-674 7.5AIHighAI2026-04-28
CVE-2026-41605 Apache Thrift: Swift Compact Protocol integer overflow — Apache ThriftCWE-190 9.8AICriticalAI2026-04-28
CVE-2026-41604 Apache Thrift: Swift Range crash in skip() — Apache ThriftCWE-125 7.5AIHighAI2026-04-28
CVE-2026-41603 Apache Thrift: Java TSSLTransportFactory hostname verification — Apache ThriftCWE-297 7.5AIHighAI2026-04-28
CVE-2026-41602 Apache Thrift: Go TFramedTransport uint32 overflow — Apache ThriftCWE-190 9.8AICriticalAI2026-04-28
CVE-2025-48431 Apache Thrift: Specially crafted input can crash a c_glib Thrift server with invalid pointer error. — Apache ThriftCWE-762 7.5AIHighAI2026-04-28
CVE-2026-40557 Apache Storm Prometheus Reporter: Disabling TLS verification for Prometheus Reporter also disables it for all other connections — Apache Storm Prometheus ReporterCWE-295 7.4AIHighAI2026-04-27
CVE-2026-41081 Apache Storm Client: Anonymous principal assigned on TLS client certificate verification failure — Apache Storm ClientCWE-287 9.1AICriticalAI2026-04-27
CVE-2026-27172 Apache Camel: Unsafe Java deserialization in camel-consul ConsulRegistry allows arbitrary code execution via malicious values read from the Consul KV store — Apache CamelCWE-502 8.8AIHighAI2026-04-27
CVE-2026-33453 Apache Camel: CoAP URI Query Parameter to Exchange Header Injection in camel-coap Allows Single-Packet Pre-Auth Remote Code Execution — Apache CamelCWE-915 9.8AICriticalAI2026-04-27
CVE-2026-33454 Apache Camel: Inbound Header Filter Missing in MailHeaderFilterStrategy Allows Remote Code Execution via MIME Header Injection (CVE-2025-30177 Variant) — Apache CamelCWE-502 9.1AICriticalAI2026-04-27
CVE-2026-40022 Apache Camel Platform HTTP Main: Authentication Bypass on Non-Root Context Paths in camel main runtime — Apache Camel Platform HTTP MainCWE-288 9.8AICriticalAI2026-04-27
CVE-2026-40858 Apache Camel: Camel-Infinispan: Unsafe Deserialization in Remote Aggregation Repository — Apache CamelCWE-502 8.8AIHighAI2026-04-27
CVE-2026-41409 Apache MINA: CWE-502 Deserialization of Untrusted Data — Apache MINACWE-502 9.8 Critical2026-04-27
CVE-2026-41635 Apache MINA: AbstractIoBuffer.resolveClass() null-clazz Branch Skips acceptMatchers Filter — Full Object Deserialization RCE — Apache MINACWE-502 9.8 Critical2026-04-27
CVE-2026-40453 Apache Camel JMS, Apache Camel CoAP, Apache Camel Google PubSub: Incomplete fix for CVE-2025-27636 in non-HTTP HeaderFilterStrategies (camel-jms, camel-sjms, camel-coap, camel-google-pubsub) allows case-variant header injection — Apache Camel JMSCWE-178 9.8AICriticalAI2026-04-27
CVE-2026-40860 Apache Camel: Unsafe Deserialization of JMS ObjectMessage in camel-jms, camel-sjms, camel-sjms2 and camel-amqp — Apache CamelCWE-502 9.8AICriticalAI2026-04-27

This page lists every published CVE security advisory associated with Apache Software Foundation. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.