CVE-2026-21876

The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 4.22.0 and 3.3.8, the current rule 922110 has a bug when processing multipart requests with multiple parts. When the first rule in a chain iterates over a collection (like `MULTIPART_PART_HEADERS`), the capture variables (`TX:0`, `TX:1`) get overwritten with each iteration. Only the last captured value is available to the chained rule, which means malicious charsets in earlier parts can be missed if a later part has a legitimate charset. Versions 4.22.0 and 3.3.8 patch the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:owasp:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*
cpe:2.3:a:owasp:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*

History

09 Apr 2026, 16:16

Type Values Removed Values Added
Summary
  • (es) El conjunto de reglas base de OWASP (CRS) es un conjunto de reglas genéricas de detección de ataques para usar con firewalls de aplicaciones web compatibles. Antes de las versiones 4.22.0 y 3.3.8, la regla actual 922110 tiene un error al procesar solicitudes multipart con múltiples partes. Cuando la primera regla en una cadena itera sobre una colección (como 'MULTIPART_PART_HEADERS'), las variables de captura ('TX:0', 'TX:1') se sobrescriben con cada iteración. Solo el último valor capturado está disponible para la regla encadenada, lo que significa que los conjuntos de caracteres maliciosos en partes anteriores pueden pasarse por alto si una parte posterior tiene un conjunto de caracteres legítimo. Las versiones 4.22.0 y 3.3.8 parchean el problema.
References
  • () https://github.com/daytriftnewgen/CVE-2026-21876 -
References () https://github.com/coreruleset/coreruleset/security/advisories/GHSA-36fv-25j3-r2c5 - Vendor Advisory, Exploit () https://github.com/coreruleset/coreruleset/security/advisories/GHSA-36fv-25j3-r2c5 - Exploit, Vendor Advisory

23 Feb 2026, 18:33

Type Values Removed Values Added
First Time Owasp owasp Modsecurity Core Rule Set
Owasp
CPE cpe:2.3:a:owasp:owasp_modsecurity_core_rule_set:*:*:*:*:*:*:*:*
References () https://github.com/coreruleset/coreruleset/commit/80d80473abf71bd49bf6d3c1ab221e3c74e4eb83 - () https://github.com/coreruleset/coreruleset/commit/80d80473abf71bd49bf6d3c1ab221e3c74e4eb83 - Patch
References () https://github.com/coreruleset/coreruleset/commit/9917985de09a6cf38b3261faf9105e909d67a7d6 - () https://github.com/coreruleset/coreruleset/commit/9917985de09a6cf38b3261faf9105e909d67a7d6 - Patch
References () https://github.com/coreruleset/coreruleset/releases/tag/v3.3.8 - () https://github.com/coreruleset/coreruleset/releases/tag/v3.3.8 - Product, Release Notes
References () https://github.com/coreruleset/coreruleset/releases/tag/v4.22.0 - () https://github.com/coreruleset/coreruleset/releases/tag/v4.22.0 - Product, Release Notes
References () https://github.com/coreruleset/coreruleset/security/advisories/GHSA-36fv-25j3-r2c5 - () https://github.com/coreruleset/coreruleset/security/advisories/GHSA-36fv-25j3-r2c5 - Vendor Advisory, Exploit

08 Jan 2026, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-08 14:15

Updated : 2026-04-09 16:16


NVD link : CVE-2026-21876

Mitre link : CVE-2026-21876

CVE.ORG link : CVE-2026-21876


JSON object : View

Products Affected

owasp

  • owasp_modsecurity_core_rule_set
CWE
CWE-794

Incomplete Filtering of Multiple Instances of Special Elements