Description
An escalation of privilege bug in various modules in Apache HTTP 2.4.66 and earlier allows local .htaccess authors to read files with the privileges of the httpd user.

Users are recommended to upgrade to version 2.4.67, which fixes this issue.
Published: 2026-05-04
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is an escalation of privilege that allows someone who can write .htaccess files to read arbitrary files in Apache HTTP Server using the mod_rewrite and ap_expr features. The flaw appears in release 2.4.66 and earlier. By inserting expressions into a .htaccess file, the attacker causes the server to resolve file paths with the privileges of the httpd user, granting read access to files that normally require higher rights, thereby compromising confidentiality. Based on the description, it is inferred that the attack requires write access to .htaccess files in a web directory.

Affected Systems

The affected products are Apache HTTP Server versions 2.4.66 and earlier. All installations running those releases on any supported platform are potentially vulnerable, regardless of the operating system.

Risk and Exploitability

Because the attack requires only the ability to create or modify a .htaccess file in a web directory, the vector is local or remote if write access is attainable. The flaw provides read capability of server files but does not directly allow code execution. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting that widespread exploitation is not documented yet. Based on the description, it is inferred that the attack can be carried out from a client that can write to a web directory, making the local or remote attack vector dependent on privileges. Nonetheless, the impact – unauthorized disclosure of sensitive files – is significant, and the CVSS score is 8.8 given the privilege escalation nature.

Generated by OpenCVE AI on May 4, 2026 at 21:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Apache HTTP Server to version 2.4.67 or later, which fixes the CWE‑269 privilege escalation bug.
  • Disable or restrict the use of AllowOverride directives so that non‑privileged users cannot supply .htaccess files, which mitigates potential CWE‑269 exploits, for example by setting Options -AllowOverride None or limiting it to a safe subset of options.
  • Ensure that only trusted administrators have write permission to web directories; apply strict file‑system permissions to prevent unauthorized creation of .htaccess files, thereby reducing the risk of CWE‑269 privilege escalation.

Generated by OpenCVE AI on May 4, 2026 at 21:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*

Mon, 04 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 04 May 2026 18:30:00 +0000

Type Values Removed Values Added
References

Mon, 04 May 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache http Server
Vendors & Products Apache
Apache http Server

Mon, 04 May 2026 13:00:00 +0000

Type Values Removed Values Added
Description An escalation of privilege bug in various modules in Apache HTTP 2.4.66 and earlier allows local .htaccess authors to read files with the privileges of the httpd user. Users are recommended to upgrade to version 2.4.67, which fixes this issue.
Title Apache HTTP Server: mod_rewrite elevation of privileges via ap_expr
Weaknesses CWE-269
References

Subscriptions

Apache Http Server
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-05-04T18:23:43.614Z

Reserved: 2026-01-21T12:37:38.184Z

Link: CVE-2026-24072

cve-icon Vulnrichment

Updated: 2026-05-04T17:32:36.948Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-04T13:16:00.297

Modified: 2026-05-04T20:27:50.263

Link: CVE-2026-24072

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T21:45:09Z

Weaknesses