🔐 CVE Alert

CVE-2024-38475

CRITICAL 9.1 ⚠️ CISA KEV

Apache HTTP Server weakness in mod_rewrite when first segment of substitution matches filesystem path.

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th

Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected.  Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.

CWE CWE-116
Vendor apache software foundation
Product apache http server
Published Jul 1, 2024
Last Updated Nov 3, 2025
⚠️ Actively Exploited — Act Now

Get instant alerts for apache software foundation apache http server

This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2024-38475.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Apache Software Foundation / Apache HTTP Server
2.4.0 ≤ 2.4.59

References

NVD ↗ CVE.org ↗ EPSS Data ↗
httpd.apache.org: https://httpd.apache.org/security/vulnerabilities_24.html security.netapp.com: https://security.netapp.com/advisory/ntap-20240712-0001/ cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-38475 blackhat.com: https://www.blackhat.com/us-24/briefings/schedule/index.html#confusion-attacks-exploiting-hidden-semantic-ambiguity-in-apache-http-server-pre-recorded-40227 github.com: https://github.com/apache/httpd/commit/9a6157d1e2f7ab15963020381054b48782bc18cf openwall.com: http://www.openwall.com/lists/oss-security/2024/07/01/8 psirt.global.sonicwall.com: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0018

Credits

Orange Tsai (@orange_8361) from DEVCORE