N
The Daily Insight

Apache patches a 0-day vulnerability already exploited by hackers

Author

Emily Beck

Updated on April 27, 2026

The Apache Software Foundation has patched a dangerous 0-day vulnerability in its HTTP web server. It is reported that the problem is already being actively exploited by hackers.

Apache HTTP Server is an open source, cross-platform web server that is extremely popular for its versatility, reliability, and free software. Thus, any vulnerability in a product has widespread consequences.

The vulnerability has the identifier CVE-2021-41773 and affects only Apache web servers running version 2.4.49. Also, the vulnerable server must have the “require all denied” option disabled, but unfortunately this is the default configuration.

The bug occurs because of the way Apache performs the conversion of various URL path schemes (a process called URI normalization). The experts explain that the vulnerability allows attackers to carry out a path traversal attack by matching URLs to files outside the expected document root. As a result, such an attack can lead to leakage of CGI scripts and more.

Also, the publication Bleeping Computer notes that a search with Shodan reveals over 100,000 installations of Apache HTTP Server 2.4.49 on the network, many of which may be vulnerable to a fresh bug.

Apache patches 0-day

Information security specialist Ash discovered attacks that are already abusing this error, together with the cPanel team, who reported the problem to the Apache developers.

A few hours after the release of version 2.4.50, a number of researchers were able to reproduce the vulnerability and have already published several experimental exploits on Twitter and GitHub.

Let me remind you that we also reported that 0-day vulnerability in Microsoft MHTML is exploited to attack Office 365 users.