Vulnerability Description
Heap-based Buffer Overflow vulnerability in mod_proxy_ajp of Apache HTTP Server. If mod_proxy_ajp connects to a malicious AJP server this AJP server can send a malicious AJP message back to mod_proxy_ajp and cause it to write 4 attacker controlled bytes after the end of a heap based buffer. This issue affects Apache HTTP Server: through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Http Server | < 2.4.67 |
Related Weaknesses (CWE)
References
- https://httpd.apache.org/security/vulnerabilities_24.htmlRelease NotesVendor Advisory
- http://www.openwall.com/lists/oss-security/2026/05/05/9Mailing ListThird Party Advisory
FAQ
What is CVE-2026-28780?
CVE-2026-28780 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Heap-based Buffer Overflow vulnerability in mod_proxy_ajp of Apache HTTP Server. If mod_proxy_ajp connects to a malicious AJP server this AJP server can send a malicious AJP message back to mod_proxy_...
How severe is CVE-2026-28780?
CVE-2026-28780 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-28780?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server.