Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4212-1 | modsecurity-apache security update |
Debian DSA |
DSA-5940-1 | modsecurity-apache security update |
EUVD |
EUVD-2025-16670 | ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to 2.9.10 contain a denial of service vulnerability similar to GHSA-859r-vvv8-rm8r/CVE-2025-47947. The `sanitiseArg` (and `sanitizeArg` - this is the same action but an alias) is vulnerable to adding an excessive number of arguments, thereby leading to denial of service. Version 2.9.10 fixes the issue. As a workaround, avoid using rules that contain the `sanitiseArg` (or `sanitizeArg`) action. |
Ubuntu USN |
USN-7567-1 | ModSecurity vulnerabilities |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 02 Jul 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Owasp
Owasp modsecurity |
|
| CPEs | cpe:2.3:a:owasp:modsecurity:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Owasp
Owasp modsecurity |
Mon, 09 Jun 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 03 Jun 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 02 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Jun 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to 2.9.10 contain a denial of service vulnerability similar to GHSA-859r-vvv8-rm8r/CVE-2025-47947. The `sanitiseArg` (and `sanitizeArg` - this is the same action but an alias) is vulnerable to adding an excessive number of arguments, thereby leading to denial of service. Version 2.9.10 fixes the issue. As a workaround, avoid using rules that contain the `sanitiseArg` (or `sanitizeArg`) action. | |
| Title | ModSecurity has possible DoS vulnerability in sanitiseArg action | |
| Weaknesses | CWE-1050 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-09T15:03:29.894Z
Reserved: 2025-05-27T20:14:34.294Z
Link: CVE-2025-48866
Updated: 2025-06-09T15:03:29.894Z
Status : Analyzed
Published: 2025-06-02T16:15:29.900
Modified: 2025-07-02T18:11:34.663
Link: CVE-2025-48866
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN