BIT-modsecurity-2025-52891

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/modsecurity/BIT-modsecurity-2025-52891.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-modsecurity-2025-52891
Aliases
Published
2025-07-04T07:41:54.070Z
Modified
2025-07-04T08:27:29.266195Z
Summary
ModSecurity empty XML tag causes segmentation fault
Details

ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. In versions 2.9.8 to before 2.9.11, an empty XML tag can cause a segmentation fault. If SecParseXmlIntoArgs is set to On or OnlyArgs, and the request type is application/xml, and at least one XML tag is empty (eg <foo></foo>), then a segmentation fault occurs. This issue has been patched in version 2.9.11. A workaround involves setting SecParseXmlIntoArgs to Off.

Database specific
{
    "severity": "Medium",
    "cpes": [
        "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*"
    ]
}
References

Affected packages

Bitnami / modsecurity

Package

Name
modsecurity
Purl
pkg:bitnami/modsecurity

Severity

  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
2.9.8
Fixed
3.0.12