Search for vulnerabilities
| Vulnerability ID | VCID-xfm9-e5nr-wyat |
| Aliases |
CVE-2022-22721
|
| Summary | If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier. |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 6.7 |
| Risk | 3.4 |
| Affected and Fixed Packages | Package Details |
| CWE-190 | Integer Overflow or Wraparound |
| CWE-787 | Out-of-bounds Write |
| System | Score | Found at |
|---|---|---|
| cvssv3 | 7.4 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22721.json |
| epss | 0.13159 | https://api.first.org/data/v1/epss?cve=CVE-2022-22721 |
| epss | 0.13159 | https://api.first.org/data/v1/epss?cve=CVE-2022-22721 |
| epss | 0.13159 | https://api.first.org/data/v1/epss?cve=CVE-2022-22721 |
| epss | 0.13159 | https://api.first.org/data/v1/epss?cve=CVE-2022-22721 |
| epss | 0.13159 | https://api.first.org/data/v1/epss?cve=CVE-2022-22721 |
| epss | 0.13159 | https://api.first.org/data/v1/epss?cve=CVE-2022-22721 |
| epss | 0.13224 | https://api.first.org/data/v1/epss?cve=CVE-2022-22721 |
| epss | 0.13224 | https://api.first.org/data/v1/epss?cve=CVE-2022-22721 |
| epss | 0.13224 | https://api.first.org/data/v1/epss?cve=CVE-2022-22721 |
| cvssv3.1 | 7.4 | https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml |
| apache_httpd | low | https://httpd.apache.org/security/json/CVE-2022-22721.json |
| Reference id | Reference type | URL |
|---|---|---|
| https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22721.json | ||
| https://api.first.org/data/v1/epss?cve=CVE-2022-22721 | ||
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721 | ||
| https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml | ||
| 2064320 | https://bugzilla.redhat.com/show_bug.cgi?id=2064320 | |
| CVE-2022-22721 | https://httpd.apache.org/security/json/CVE-2022-22721.json | |
| GLSA-202208-20 | https://security.gentoo.org/glsa/202208-20 | |
| RHSA-2022:6753 | https://access.redhat.com/errata/RHSA-2022:6753 | |
| RHSA-2022:7647 | https://access.redhat.com/errata/RHSA-2022:7647 | |
| RHSA-2022:8067 | https://access.redhat.com/errata/RHSA-2022:8067 | |
| RHSA-2022:8840 | https://access.redhat.com/errata/RHSA-2022:8840 | |
| RHSA-2022:8841 | https://access.redhat.com/errata/RHSA-2022:8841 | |
| USN-5333-1 | https://usn.ubuntu.com/5333-1/ | |
| USN-5333-2 | https://usn.ubuntu.com/5333-2/ |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Percentile | 0.94093 |
| EPSS Score | 0.13159 |
| Published At | April 2, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T12:36:23.317205+00:00 | Apache HTTPD Importer | Import | https://httpd.apache.org/security/json/CVE-2022-22721.json | 38.0.0 |