Apache Vulnerabilities
Comprehensive security vulnerability database for Apache products
9
7
18
6
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-69219 | 8.8 | This vulnerability allows an attacker with access to the database to run unauthorized code, effectively giving them the same permissions as the original creator of workflows in Airflow. While direct access to the database is uncommon and not recommended, upgrading to version 6.0.0 of the provider is essential to eliminate this risk. | apacheairflow providers http | Exploit Available | 29 days agoMar 9, 2026 |
| CVE-2026-24308 | 7.5 | This vulnerability allows an attacker to access sensitive information from client configuration files that are improperly logged in Apache ZooKeeper, potentially exposing critical data in production environments. It affects versions 3.8.5 and 3.9.4, so users should upgrade to the latest versions to protect against this issue. | apachezookeeper | Exploit Available | about 1 month agoMar 7, 2026 |
| CVE-2026-24281 | 7.4 | This vulnerability allows attackers to impersonate ZooKeeper servers or clients by controlling or spoofing reverse DNS records, potentially tricking systems into trusting them. However, the attacker must also present a valid certificate that is recognized by the system, making it more challenging to exploit. | apachezookeeper | Exploit Available | about 1 month agoMar 7, 2026 |
| CVE-2025-66168 | 8.8 | This vulnerability allows an attacker to send specially crafted messages to an Apache ActiveMQ broker, potentially causing it to misinterpret the data and behave unexpectedly. It can occur after a user has successfully logged in, but only affects brokers that are using MQTT transport connectors. | apacheactivemq | Theoretical | about 1 month agoMar 4, 2026 |
| CVE-2026-23984 | 7.1 | This vulnerability allows an authenticated user with access to SQLLab in Apache Superset to bypass restrictions and execute unauthorized data manipulation commands on a PostgreSQL database, even though the system is supposed to prevent such actions. To exploit this, the attacker must have valid credentials and access to the SQLLab feature before the software is updated to version 6.0.0, which fixes the issue. | apachesuperset | Theoretical | about 1 month agoFeb 24, 2026 |
| CVE-2026-23982 | 7.1 | This vulnerability allows a low-privileged user to access unauthorized data by manipulating existing datasets in Apache Superset. An attacker needs to have permission to create datasets and read charts, which lets them overwrite SQL queries and bypass data access controls. | apachesuperset | Exploit Available | about 1 month agoFeb 24, 2026 |
| CVE-2024-56373 | 8.4 | This vulnerability allows a user with high-level permissions in Apache Airflow to execute arbitrary code on the web server by manipulating the database, particularly when viewing historical task logs. To mitigate this risk, users should upgrade to Airflow 3 or disable the log template history feature, which is turned off by default in version 2.11.1. | apacheairflow | Exploit Available | about 1 month agoFeb 24, 2026 |
| CVE-2026-25747 | 8.8 | This vulnerability allows an attacker to execute arbitrary code on a server running Apache Camel if they can write to the LevelDB database files used by the application. This means that if an attacker has access to modify these files, they can inject malicious code that runs when the application processes the data, potentially compromising the entire system. | apachecamel | Exploit Available | about 1 month agoFeb 23, 2026 |
| CVE-2022-36125 | 7.5 | An attacker can crash an application by sending it corrupted data when using the Apache Avro Rust SDK, which can disrupt services and lead to downtime. This vulnerability affects versions prior to 0.14.0, so users should upgrade to the latest version to protect against this issue. | apacheavro | Theoretical | over 3 years agoAug 9, 2022 |
About Apache Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Apache products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.