Source: modsecurity-apache Version: 2.9.9-1 Severity: grave Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]> Control: found -1 2.9.7-1
The following vulnerability was published for modsecurity-apache. CVE-2025-48866[0]: | ModSecurity is an open source, cross platform web application | firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to | 2.9.10 contain a denial of service vulnerability similar to | GHSA-859r-vvv8-rm8r/CVE-2025-47947. The `sanitiseArg` (and | `sanitizeArg` - this is the same action but an alias) is vulnerable | to adding an excessive number of arguments, thereby leading to | denial of service. Version 2.9.10 fixes the issue. As a workaround, | avoid using rules that contain the `sanitiseArg` (or `sanitizeArg`) | action. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-48866 https://www.cve.org/CVERecord?id=CVE-2025-48866 [1] https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-f82j-8pp7-cw2w [2] https://github.com/owasp-modsecurity/ModSecurity/commit/3a54ccea62d3f7151bb08cb78d60c5e90b53ca2e Please adjust the affected versions in the BTS as needed. Regards, Salvatore

