Skip to main content

Apache Releases Security Update for Apache HTTP Server (HTTP/2)

CVE‑2026‑23918 could allow remote unauthenticated attackers to achieve remote code execution or denial‑of‑service on Apache HTTP Server

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

CVE‑2026‑23918 could allow remote unauthenticated attackers to achieve remote code execution or denial‑of‑service on Apache HTTP Server


Affected platforms

The following platforms are known to be affected:

Threat details

Proof-of-Concept Exploit for CVE-2026-23918

Security researchers have published a proof‑of‑concept exploit for CVE-2026-23918.

The NHS England National CSOC assesses exploitation as highly likely. 


Introduction

Apache Software Foundation has released a security update to address a high‑severity vulnerability in Apache HTTP Server. Successful exploitation could allow an unauthenticated remote attacker to crash the service or potentially achieve remote code execution.

  • CVE‑2026‑23918 – "Double Free" vulnerability – CVSS v3.1 score of 8.8

Note: The installation of Apache HTTP Server must have HTTP/2 protocol enabled to be affected by this vulnerability.


Remediation advice

Affected organisations are encouraged to review the Apache advisory Apache HTTP Server Security Vulnerabilities (2.4.x) and apply relevant patches as soon as possible.



Last edited: 7 May 2026 2:38 pm