⚠️⚠️⚠️ Critical Apache Server Bug Allows Remote Attacks / CloudLinux users can update their Apache using cl-ea4-testing repo,

  • Tuesday, 5th May, 2026
  • 19:23pm

⚠️⚠️⚠️ Critical Apache Server Bug Allows Remote Attacks

A serious security flaw has been discovered in Apache HTTP Server that could let hackers remotely take control of vulnerable servers.

Update it even if you use LiteSpeed or Nginx

Do not let any open vulnerability exist on your server

The main issue, tracked as CVE-2026-23918, affects Apache’s HTTP/2 feature

 

More info : 

https://support.cpanel.net/hc/en-us/articles/40229402602519-Security-CVE-2026-23918

https://cybersecuritynews.com/apache-http-server-rce/

 

update your Apache using :

 

RHEL based servers :

yum clean all

yum makecache

yum -y update ea-apache*

 

Almalinux :

dnf clean all

dnf makecache

dnf -y update ea-apache*

 

On Ubuntu : 

apt update 

apt install --only-upgrade "ea-apache24*"

 

Check update by running :

httpd -v

You should see Apache/2.4.67

---------------

CloudLinux users can update their Apache using cl-ea4-testing repo,

https://cloudlinux.zendesk.com/hc/en-us/articles/27239221402908-Apache-CVE-2026-23918-ea-apache24-2-4-67-is-not-available-in-CloudLinux-repositories

Command :

yum update ea-apache24 --enablerepo=cl-ea4-testing

 

« Back