CVE-2026-33007
NULL pointer dereference in Apache HTTP Server
Publication date: 2026-05-04
Last updated on: 2026-05-04
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | http_server | From 2.4.0 (inc) to 2.4.67 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL pointer dereference in the mod_authn_socache module of Apache HTTP Server versions 2.4.66 and earlier.
It allows an unauthenticated remote user to cause a crash of a child process when the server is configured as a caching forward proxy.
How can this vulnerability impact me? :
The impact of this vulnerability is that an unauthenticated remote attacker can crash a child process of the Apache HTTP Server.
This can lead to denial of service conditions, affecting the availability of the server.
What immediate steps should I take to mitigate this vulnerability?
Users are recommended to upgrade to Apache HTTP Server version 2.4.67, which fixes this issue.