CVE-2025-48866

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-48866
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-48866.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-48866
Aliases
Downstream
Related
Published
2025-06-02T15:46:19.909Z
Modified
2025-12-05T10:10:40.965471Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
ModSecurity has possible DoS vulnerability in sanitiseArg action
Details

ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to 2.9.10 contain a denial of service vulnerability similar to GHSA-859r-vvv8-rm8r/CVE-2025-47947. The sanitiseArg (and sanitizeArg - this is the same action but an alias) is vulnerable to adding an excessive number of arguments, thereby leading to denial of service. Version 2.9.10 fixes the issue. As a workaround, avoid using rules that contain the sanitiseArg (or sanitizeArg) action.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/48xxx/CVE-2025-48866.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-1050"
    ]
}
References

Affected packages

Git / github.com/owasp-modsecurity/modsecurity

Affected ranges

Type
GIT
Repo
https://github.com/owasp-modsecurity/modsecurity
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v2.*

v2.7.2
v2.7.3
v2.7.4
v2.7.5
v2.7.6
v2.7.7
v2.9.0
v2.9.0-rc1
v2.9.0-rc2
v2.9.1
v2.9.1-rc1
v2.9.2
v2.9.3
v2.9.4
v2.9.5
v2.9.6
v2.9.7
v2.9.8
v2.9.9

Git / github.com/spiderlabs/modsecurity

Affected ranges

Type
GIT
Repo
https://github.com/spiderlabs/modsecurity
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v2.*

v2.7.2
v2.7.3
v2.7.4
v2.7.5
v2.7.6
v2.7.7
v2.9.0
v2.9.0-rc1
v2.9.0-rc2
v2.9.1
v2.9.1-rc1
v2.9.2
v2.9.3
v2.9.4
v2.9.5
v2.9.6
v2.9.7
v2.9.8
v2.9.9