{"api_version":"1","generated_at":"2026-04-23T00:40:48+00:00","cve":"CVE-2021-20325","urls":{"html":"https://cve.report/CVE-2021-20325","api":"https://cve.report/api/cve/CVE-2021-20325.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-20325","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-20325"},"summary":{"title":"CVE-2021-20325","description":"Missing fixes for CVE-2021-40438 and CVE-2021-26691 in the versions of httpd, as shipped in Red Hat Enterprise Linux 8.5.0, causes a security regression compared to the versions shipped in Red Hat Enterprise Linux 8.4. A user who installs or updates to Red Hat Enterprise Linux 8.5.0 would be vulnerable to the mentioned CVEs, even if they were properly fixed in Red Hat Enterprise Linux 8.4. CVE-2021-20325 was assigned to that Red Hat specific security regression and it does not affect the upstream versions of httpd.","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2022-02-18 18:15:00","updated_at":"2023-11-07 03:29:00"},"problem_types":["CWE-787","CWE-918"],"metrics":[],"references":[{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017321","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2017321","refsource":"MISC","tags":[],"title":"2017321 – (CVE-2021-20325) CVE-2021-20325 httpd: Regression of CVE-2021-40438 and CVE-2021-26691 fixes in Red Hat Enterprise Linux 8.5","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-20325","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20325","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"20325","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"redhat","cpe5":"enterprise_linux","cpe6":"8.5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-20325","qid":"159523","title":"Oracle Enterprise Linux Security Update for httpd:2.4 (ELSA-2021-4537)"},{"cve":"CVE-2021-20325","qid":"239871","title":"Red Hat Update for httpd:2.4 (RHSA-2021:4537)"},{"cve":"CVE-2021-20325","qid":"940323","title":"AlmaLinux Security Update for httpd:2.4 (ALSA-2021:4537)"},{"cve":"CVE-2021-20325","qid":"960282","title":"Rocky Linux Security Update for httpd:2.4 (RLSA-2021:4537)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-20325","ASSIGNER":"secalert@redhat.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"httpd","version":{"version_data":[{"version_value":"httpd 2.4.47, httpd 2.4.49"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"(CWE-119|CWE-918)"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2017321","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2017321"}]},"description":{"description_data":[{"lang":"eng","value":"Missing fixes for CVE-2021-40438 and CVE-2021-26691 in the versions of httpd, as shipped in Red Hat Enterprise Linux 8.5.0, causes a security regression compared to the versions shipped in Red Hat Enterprise Linux 8.4. A user who installs or updates to Red Hat Enterprise Linux 8.5.0 would be vulnerable to the mentioned CVEs, even if they were properly fixed in Red Hat Enterprise Linux 8.4. CVE-2021-20325 was assigned to that Red Hat specific security regression and it does not affect the upstream versions of httpd."}]}},"nvd":{"publishedDate":"2022-02-18 18:15:00","lastModifiedDate":"2023-11-07 03:29:00","problem_types":["CWE-787","CWE-918"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":10},"severity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:8.5.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"20325","Ordinal":"194366","Title":"CVE-2021-20325","CVE":"CVE-2021-20325","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"20325","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}