Skip to main content Skip to local navigation

Apache HTTP Server Vulnerability (CVE-2026-23918)

 

A picture containing text  Description automatically generated

 

Information Security Advisory

 

Apache has released a security update to address a vulnerability (CVE‑2026‑23918) in Apache HTTP Server that may result in denial‑of‑service and potential remote code execution under specific configurations.

Severity level:
CVSS Score: 8.8/High.

Description:
CVE‑2026‑23918 is a double‑free vulnerability in the mod_http2 module of Apache HTTP Server that occurs during HTTP/2 stream handling. A specially crafted sequence of HTTP/2 frames can cause improper memory deallocation, leading to worker process crashes. In certain deployments—particularly those using Apache Portable Runtime (APR) with the mmap allocator—this flaw may be leveraged to achieve remote code execution in addition to denial‑of‑service.

Affected Versions:
Apache HTTP Server version 2.4.66 with mod_http2_enabled.

Impact:

Successful exploitation may allow attackers to potentially execute arbitrary code remotely on vulnerable systems.

Resolution:
Please upgrade to Apache HTTP Server 2.4.67 or later.

Reference:

https://nvd.nist.gov/vuln/detail/CVE-2026-23918

https://www.cve.org/CVERecord?id=CVE-2026-23918

https://httpd.apache.org/security/vulnerabilities_24.html

https://thehackernews.com/2026/05/critical-apache-http2-flaw-cve-2026.html

 



Information Security 

Contact
IT Client Services at askIT@yorku.ca or 416 736 5800

 

 

PRIVACY POLICY | VISIT WWW.YORKU.CA
This email was sent by: York University, 4700 Keele Street, Toronto, Ontario M3J 1P3

This email is viewed best in Microsoft Outlook for web