The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-58098

CVE-2025-58098: Apache HTTP Server SSI RCE Vulnerability

CVE-2025-58098 is a remote code execution vulnerability in Apache HTTP Server affecting versions 2.4.65 and earlier when SSI and mod_cgid are enabled. This article covers technical details, affected versions, and mitigation.

Published: April 1, 2026

CVE-2025-58098 Overview

Apache HTTP Server versions 2.4.65 and earlier contain an information exposure vulnerability when Server Side Includes (SSI) are enabled in conjunction with mod_cgid. The vulnerability occurs because the web server improperly passes the shell-escaped query string to #exec cmd="..." directives, potentially exposing sensitive information through SSI processing.

Critical Impact

Attackers with low privileges can exploit this network-accessible vulnerability to achieve high confidentiality and integrity impact, potentially exposing sensitive query string data processed through SSI directives.

Affected Products

  • Apache HTTP Server versions before 2.4.66
  • Systems with Server Side Includes (SSI) enabled
  • Configurations using mod_cgid (not affected when using mod_cgi)

Discovery Timeline

  • December 5, 2025 - CVE-2025-58098 published to NVD
  • December 8, 2025 - Last updated in NVD database

Technical Details for CVE-2025-58098

Vulnerability Analysis

This vulnerability (CWE-201: Insertion of Sensitive Information Into Sent Data) affects the way Apache HTTP Server handles query strings when Server Side Includes are processed through the mod_cgid module. The core issue lies in how shell-escaped query strings are passed to SSI #exec cmd directives, creating a path for unintended information exposure.

The vulnerability is exploitable over the network with low attack complexity. While it requires low-level privileges to exploit, no user interaction is needed. The impact includes high confidentiality and integrity compromise with low availability impact. Organizations running Apache HTTP Server with SSI enabled and mod_cgid should assess their exposure immediately.

Root Cause

The root cause stems from improper handling of query string data within the mod_cgid module. When SSI directives containing #exec cmd="..." are processed, the module passes shell-escaped query strings in a manner that can expose sensitive information. This behavior differs from the mod_cgi module, which handles the same scenario securely.

The vulnerability is classified under CWE-201 (Insertion of Sensitive Information Into Sent Data), indicating that sensitive query string parameters may be inadvertently included in output or accessible through the SSI execution context.

Attack Vector

The attack vector is network-based, allowing remote exploitation. An attacker with low-level privileges can craft requests containing specially formatted query strings that, when processed by SSI #exec cmd directives, result in information exposure. The attack does not require user interaction and has a contained scope, meaning it does not extend beyond the vulnerable component.

Exploitation targets web servers running Apache HTTP Server 2.4.65 or earlier with the following configuration requirements:

  • Server Side Includes (SSI) must be enabled
  • mod_cgid must be loaded (mod_cgi is not affected)
  • SSI pages must contain #exec cmd directives

Detection Methods for CVE-2025-58098

Indicators of Compromise

  • Unusual query string patterns in Apache access logs targeting .shtml or SSI-enabled files
  • Unexpected command execution patterns in mod_cgid process logs
  • Anomalous output from SSI-processed pages containing query string data

Detection Strategies

  • Monitor Apache access logs for requests to SSI-enabled resources with suspicious query string parameters
  • Implement web application firewall rules to detect and block malformed SSI exploitation attempts
  • Review mod_cgid execution logs for unexpected shell command patterns
  • Deploy runtime application self-protection (RASP) to detect SSI injection attempts

Monitoring Recommendations

  • Enable verbose logging for mod_cgid to capture command execution details
  • Configure security information and event management (SIEM) alerts for anomalous SSI file access patterns
  • Implement file integrity monitoring on SSI-enabled web content directories
  • Establish baseline metrics for normal SSI processing behavior to identify deviations

How to Mitigate CVE-2025-58098

Immediate Actions Required

  • Upgrade Apache HTTP Server to version 2.4.66 or later immediately
  • If immediate upgrade is not possible, disable Server Side Includes or switch from mod_cgid to mod_cgi
  • Review and audit all SSI files containing #exec cmd directives
  • Implement input validation on query strings reaching SSI-enabled content

Patch Information

Apache has released version 2.4.66 which resolves this vulnerability. Users are strongly recommended to upgrade to this version to address the security issue. Detailed patch information and security advisories are available from the Apache HTTP Server Vulnerability List.

Additional technical discussion regarding this vulnerability can be found on the OpenWall OSS-Security Mailing List.

Workarounds

  • Disable Server Side Includes by removing Options +Includes from Apache configuration
  • Replace mod_cgid with mod_cgi in environments where SSI with #exec cmd is required
  • Remove or comment out #exec cmd directives from SSI files and replace with safer alternatives
  • Implement strict input filtering on query strings at the reverse proxy or WAF level
bash
# Configuration example - Disable SSI in Apache
# Add to httpd.conf or virtual host configuration

# Option 1: Disable SSI globally
<Directory "/var/www/html">
    Options -Includes
</Directory>

# Option 2: Switch from mod_cgid to mod_cgi
# Comment out mod_cgid and enable mod_cgi
# LoadModule cgid_module modules/mod_cgid.so
LoadModule cgi_module modules/mod_cgi.so

# Option 3: Restrict SSI exec commands
<Directory "/var/www/html">
    Options +IncludesNOEXEC
</Directory>

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechApache

  • SeverityHIGH

  • CVSS Score8.3

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-201
  • Technical References
  • OpenWall OSS-Security Mailing List Post
  • Vendor Resources
  • Apache HTTP Server Vulnerability List
  • Related CVEs
  • CVE-2016-15057: Apache Continuum RCE Vulnerability

  • CVE-2025-67895: Apache Airflow Edge3 Provider RCE Flaw

  • CVE-2025-53192: Apache Commons OGNL RCE Vulnerability

  • CVE-2023-26512: Apache EventMesh RabbitMQ RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English