We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-48866

ModSecurity has possible DoS vulnerability in sanitiseArg action



Description

ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to 2.9.10 contain a denial of service vulnerability similar to GHSA-859r-vvv8-rm8r/CVE-2025-47947. The `sanitiseArg` (and `sanitizeArg` - this is the same action but an alias) is vulnerable to adding an excessive number of arguments, thereby leading to denial of service. Version 2.9.10 fixes the issue. As a workaround, avoid using rules that contain the `sanitiseArg` (or `sanitizeArg`) action.

Reserved 2025-05-27 | Published 2025-06-02 | Updated 2025-06-02 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-1050: Excessive Platform Resource Consumption within a Loop

Product status

< 2.9.10
affected

References

github.com/...curity/security/advisories/GHSA-f82j-8pp7-cw2w

github.com/...curity/security/advisories/GHSA-859r-vvv8-rm8r

github.com/...ommit/3a54ccea62d3f7151bb08cb78d60c5e90b53ca2e

github.com/...urity/ModSecurity/wiki/Reference-Manual-(v2.x)

cve.org (CVE-2025-48866)

nvd.nist.gov (CVE-2025-48866)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-48866

Support options

Helpdesk Chat, Email, Knowledgebase