Jan 7, 2026·6 min read·5 visits
Apache 2.4.49 introduced a new path normalization function that forgot how URL encoding works. By replacing dots with `%2e`, attackers can walk out of the web root (`/var/www/html`) and into the server root (`/`). If `mod_cgi` is on, they can execute `/bin/sh` and take over the box. Patch immediately to 2.4.51 (skip 2.4.50, it was broken too).
A critical path traversal vulnerability in Apache HTTP Server 2.4.49 allows unauthenticated attackers to map URLs to files outside the expected document root. If CGI is enabled, this escalates to Remote Code Execution (RCE). The flaw stems from a botched path normalization logic change that failed to account for URL-encoded characters.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
Apache HTTP Server Apache Software Foundation | = 2.4.49 | 2.4.51 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-22 |
| Attack Vector | Network |
| CVSS | 9.8 (Critical) |
| EPSS Score | 94.38% |
| Impact | RCE & Information Disclosure |
| Exploit Status | Active / Weaponized |
| KEV Listed | Yes |
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.