Apache HTTP Server: buffer overflow in mod_proxy_ajp via ajp_msg_check_header()
Summary
| CVE | CVE-2026-28780 |
|---|---|
| State | PUBLISHED |
| Assigner | apache |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-05 22:16:00 UTC |
| Updated | 2026-05-05 23:16:17 UTC |
| Description | Heap-based Buffer Overflow vulnerability in mod_proxy_ajp of Apache HTTP Server. If mod_proxy_ajp connects to a malicious AJP server this AJP server can send a malicious AJP message back to mod_proxy_ajp and cause it to write 4 attacker controlled bytes after the end of a heap based buffer. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue. |
Risk And Classification
Problem Types: CWE-122 | CWE-122 CWE-122 Heap-based Buffer Overflow
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Apache Software Foundation | Apache HTTP Server | affected 2.4.66 semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| httpd.apache.org/security/vulnerabilities_24.html | [email protected] | httpd.apache.org | |
| www.openwall.com/lists/oss-security/2026/05/05/9 | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Andrew Lacambra (en)
CNA: Elhanan Haenel (en)
CNA: Tianshuo Han (<[email protected]>) (en)
CNA: Tristan Madani (en)
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2026-02-04T12:00:00.000Z | reported |
| CNA | 2026-03-18T12:00:00.000Z | reported by 3rd finder |
| CNA | 2026-02-28T12:00:00.000Z | reported by 2nd finder |
There are currently no legacy QID mappings associated with this CVE.