Improper Neutralization Affecting jbcs-httpd24-openssl package, versions <1:1.1.1k-21.el7jbcs


Severity

Recommended
high

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.16% (38th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-JBCSHTTPD24OPENSSL-15542732
  • published14 Mar 2026
  • disclosed5 Dec 2025

Introduced: 5 Dec 2025

CVE-2025-65082  (opens in a new tab)
CWE-150  (opens in a new tab)

How to fix?

Upgrade RHEL:7 jbcs-httpd24-openssl to version 1:1.1.1k-21.el7jbcs or higher.
This issue was patched in RHSA-2026:2994.

NVD Description

Note: Versions mentioned in the description apply only to the upstream jbcs-httpd24-openssl package and not the jbcs-httpd24-openssl package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.

This issue affects Apache HTTP Server from 2.4.0 through 2.4.65.

Users are recommended to upgrade to version 2.4.66 which fixes the issue.

CVSS Base Scores

version 3.1