All Threat Alerts
criticalCVE Alert
CVE-2024-38474

Critical RCE in Apache HTTP Server (CVE-2024-38474) Allows Full System Takeover

Apache HTTP Server mod_rewrite vulnerability enables remote code execution

Apache HTTP Server versions through 2.4.59 contain a critical vulnerability in the mod_rewrite module (CVE-2024-38474). An unauthenticated remote attacker can exploit flawed URL encoding handling to achieve code execution on the underlying server. CVSS 9.8. Actively exploited in the wild.

Tuesday, April 14, 2026Apache Software FoundationVulnios Threat Intelligence
Share:

Vulnerability Overview

CVE-2024-38474 is a critical remote code execution vulnerability in Apache HTTP Server mod_rewrite module. The flaw allows unauthenticated attackers to execute arbitrary code on affected servers through specially crafted HTTP requests.

Impact Assessment

• CVSS Score: 9.8 / 10 (Critical)

• Attack Vector: Network (remote, unauthenticated)

• User Interaction: None required

• Impact: Full compromise

• CISA KEV: Yes

Affected Versions

• Apache HTTP Server 2.4.0 through 2.4.59

• Any configuration using mod_rewrite with backreferences

• All operating systems

Recommended Actions

  • Upgrade immediately to Apache HTTP Server 2.4.60 or later
  • If immediate patching is not possible, disable mod_rewrite
  • Deploy WAF rules to detect exploitation attempts
  • Monitor access logs for suspicious URL-encoded patterns
  • Run a vulnerability scan with Vulnios
  • AI Security Advisor

    Powered by Gemini

    Get AI-powered security recommendations tailored to this specific threat — including risk assessment, detection guidance, MITRE ATT&CK mapping, and actionable remediation steps.

    Affected Products

    Apache HTTP Server 2.4.xApache HTTP Server 2.4.59 and earlier

    Sources

    apachercecriticalweb_serveractively_exploitedcisa_kevmod_rewrite

    Protect Your Organization

    Monitor CVEs, scan for vulnerabilities, and get real-time threat alerts — all in one platform.

    Get instant alerts on Telegram

    Join our public channel for real-time critical CVE alerts.

    Follow @vulnios