Description
A NULL pointer dereference in mod_dav_lock in Apache HTTP Server 2.4.66 and earlier may allow an attacker to crash the server with a malicious request.mod_dav_lock is not used internally by mod_dav or mod_dav_fs.

The only known use-case for mod_dav_lock was mod_dav_svn from Apache Subversion earlier than version 1.2.0.

Users are recommended to upgrade to version 2.4.66, which fixes this issue, or remove mod_dav_lock.
Published: 2026-05-04
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A NULL pointer dereference occurs in the mod_dav_lock module of Apache HTTP Server earlier than 2.4.66 when processing a malicious request, leading to a server crash. The flaw is triggered only when the module is loaded, and an attacker can cause an abrupt termination of the HTTP service, disrupting availability for clients. No maintenance or persistence beyond the crash is achieved, and an attacker cannot directly execute code.

Affected Systems

All installations of Apache HTTP Server earlier than version 2.4.66 that load the optional mod_dav_lock module are vulnerable. This module was rarely used internally by Apache itself; outside use occurs in the mod_dav_svn plugin of Apache Subversion versions older than 1.2.0. Systems that do not enable mod_dav_lock or do not run an affected Subversion server are not impacted.

Risk and Exploitability

The vulnerability carries no known exploitation in the wild and is not listed in CISA's KEV catalog. EPSS data is unavailable, so the probability of exploitation cannot be quantified. However, because the flaw manifests only when the module is active, a remote attacker who can send crafted DAV requests to a vulnerable server could directly cause a denial of service by crashing the process. The CVSS score of 7.5 indicates a high severity level.

Generated by OpenCVE AI on May 4, 2026 at 17:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Apache HTTP Server to version 2.4.66 or later, which contains the fix for mod_dav_lock.
  • If an upgrade is not feasible, remove or comment out the mod_dav_lock module from the server configuration to prevent the crash trigger.
  • For environments that rely on Apache Subversion via mod_dav_svn, upgrade Subversion to version 1.2.0 or later or disable the mod_dav_svn module to eliminate the use of mod_dav_lock.

Generated by OpenCVE AI on May 4, 2026 at 17:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 02:45:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache http Server
CPEs cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache http Server

Mon, 04 May 2026 18:30:00 +0000

Type Values Removed Values Added
References

Mon, 04 May 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache Software Foundation
Apache Software Foundation apache Http Server
Vendors & Products Apache Software Foundation
Apache Software Foundation apache Http Server

Mon, 04 May 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 15:00:00 +0000

Type Values Removed Values Added
Description A NULL pointer dereference in mod_dav_lock in Apache HTTP Server 2.4.66 and earlier may allow an attacker to crash the server with a malicious request.mod_dav_lock is not used internally by mod_dav or mod_dav_fs. The only known use-case for mod_dav_lock was mod_dav_svn from Apache Subversion earlier than version 1.2.0. Users are recommended to upgrade to version 2.4.66, which fixes this issue, or remove mod_dav_lock.
Title Apache HTTP Server: mod_dav_lock indirect lock crash
Weaknesses CWE-476
References

Subscriptions

Apache Http Server
Apache Software Foundation Apache Http Server
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-05-04T17:32:38.100Z

Reserved: 2026-03-04T11:50:32.014Z

Link: CVE-2026-29169

cve-icon Vulnrichment

Updated: 2026-05-04T17:32:38.100Z

cve-icon NVD

Status : Analyzed

Published: 2026-05-04T15:16:03.720

Modified: 2026-05-05T02:36:06.570

Link: CVE-2026-29169

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T17:30:04Z

Weaknesses