We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to 2.9.10 contain a denial of service vulnerability similar to GHSA-859r-vvv8-rm8r/CVE-2025-47947. The `sanitiseArg` (and `sanitizeArg` - this is the same action but an alias) is vulnerable to adding an excessive number of arguments, thereby leading to denial of service. Version 2.9.10 fixes the issue. As a workaround, avoid using rules that contain the `sanitiseArg` (or `sanitizeArg`) action.
Reserved 2025-05-27 | Published 2025-06-02 | Updated 2025-06-02 | Assigner GitHub_MCWE-1050: Excessive Platform Resource Consumption within a Loop
github.com/...curity/security/advisories/GHSA-f82j-8pp7-cw2w
github.com/...curity/security/advisories/GHSA-859r-vvv8-rm8r
github.com/...ommit/3a54ccea62d3f7151bb08cb78d60c5e90b53ca2e
github.com/...urity/ModSecurity/wiki/Reference-Manual-(v2.x)
Support options