ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions up to and including 2.9.8 are vulnerable to denial of service in one special case (in stable released versions): when the payload's content type is `application/json`, and there is at least one rule which does a `sanitiseMatchedBytes` action. A patch is available at pull request 3389 and expected to be part of version 2.9.9. No known workarounds are available.
References
Link | Resource |
---|---|
https://github.com/owasp-modsecurity/ModSecurity/pull/3389 | Issue Tracking Patch |
https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-859r-vvv8-rm8r | Exploit Vendor Advisory |
https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-859r-vvv8-rm8r | Exploit Vendor Advisory |
Configurations
History
20 Jun 2025, 16:13
Type | Values Removed | Values Added |
---|---|---|
First Time |
Trustwave
Trustwave modsecurity |
|
CPE | cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:* | |
References | () https://github.com/owasp-modsecurity/ModSecurity/pull/3389 - Issue Tracking, Patch | |
References | () https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-859r-vvv8-rm8r - Exploit, Vendor Advisory |
22 May 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-859r-vvv8-rm8r - |
21 May 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-21 22:15
Updated : 2025-06-20 16:13
NVD link : CVE-2025-47947
Mitre link : CVE-2025-47947
CVE.ORG link : CVE-2025-47947
JSON object : View
Products Affected
trustwave
- modsecurity
CWE
CWE-1050
Excessive Platform Resource Consumption within a Loop