Source: modsecurity-apache
Version: 2.9.9-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Control: found -1 2.9.7-1

The following vulnerability was published for modsecurity-apache.

CVE-2025-48866[0]:
| ModSecurity is an open source, cross platform web application
| firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to
| 2.9.10 contain a denial of service vulnerability similar to
| GHSA-859r-vvv8-rm8r/CVE-2025-47947. The `sanitiseArg` (and
| `sanitizeArg` - this is the same action but an alias) is vulnerable
| to adding an excessive number of arguments, thereby leading to
| denial of service. Version 2.9.10 fixes the issue. As a workaround,
| avoid using rules that contain the  `sanitiseArg` (or `sanitizeArg`)
| action.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-48866
    https://www.cve.org/CVERecord?id=CVE-2025-48866
[1] 
https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-f82j-8pp7-cw2w
[2] 
https://github.com/owasp-modsecurity/ModSecurity/commit/3a54ccea62d3f7151bb08cb78d60c5e90b53ca2e

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to