Trustwave Modsecurity vulnerabilities
20 known vulnerabilities affecting trustwave/modsecurity.
Total CVEs
20
CISA KEV
0
Public exploits
3
Exploited in wild
0
Severity breakdown
HIGH12MEDIUM8
Vulnerabilities
Page 1 of 1
CVE-2025-47947HIGHCVSS 7.5fixed in 2.9.92025-05-21
CVE-2025-47947 [HIGH] CWE-1050 CVE-2025-47947: ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS
ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions up to and including 2.9.8 are vulnerable to denial of service in one special case (in stable released versions): when the payload's content type is `application/json`, and there is at least one rule which does a `sanitiseMatchedBytes
nvd
CVE-2025-27110HIGHCVSS 7.9v3.0.132025-02-25
CVE-2025-27110 [HIGH] CWE-172 CVE-2025-27110: Libmodsecurity is one component of the ModSecurity v3 project. The library codebase serves as an int
Libmodsecurity is one component of the ModSecurity v3 project. The library codebase serves as an interface to ModSecurity Connectors taking in web traffic and applying traditional ModSecurity processing. A bug that exists only in Libmodsecurity3 version 3.0.13 means that, in 3.0.13, Libmodsecurity3 can't decode encoded HTML entities if they contains l
nvdosv
CVE-2024-46292HIGHCVSS 7.5v3.0.122024-10-09
CVE-2024-46292 [HIGH] CWE-120 CVE-2024-46292: A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a c
A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentation indicates that it is not guaranteed to be usable with very large values of SecRequestBodyNoFilesLimi
nvd
CVE-2024-1019HIGHCVSS 8.6≥ 0, < 3.0.12-12024-01-30
CVE-2024-1019 [HIGH] CVE-2024-1019: ModSecurity / libModSecurity 3
ModSecurity / libModSecurity 3.0.0 to 3.0.11 is affected by a WAF bypass for path-based payloads submitted via specially crafted request URLs. ModSecurity v3 decodes percent-encoded characters present in request URLs before it separates the URL path component from the optional query string component. This results in an impedance mismatch versus RFC compliant back-end applications. The vulnerability hides an attack payload in the
osv
CVE-2023-38285HIGHCVSS 7.5≥ 0, < 3.0.9-1+deb12u1≥ 0, < 3.0.10-12023-07-26
CVE-2023-38285 [HIGH] CVE-2023-38285: Trustwave ModSecurity 3
Trustwave ModSecurity 3.x before 3.0.10 has Inefficient Algorithmic Complexity.
osv
CVE-2023-28882HIGHCVSS 7.5≥ 0, < 3.0.9-12023-04-28
CVE-2023-28882 [HIGH] CVE-2023-28882: Trustwave ModSecurity 3
Trustwave ModSecurity 3.0.5 through 3.0.8 before 3.0.9 allows a denial of service (worker crash and unresponsiveness) because some inputs cause a segfault in the Transaction class for some configurations.
osv
CVE-2023-24021HIGHCVSS 7.5fixed in 2.9.72023-01-20
CVE-2023-24021 [HIGH] CWE-170 CVE-2023-24021: Incorrect handling of '\0' bytes in file uploads in ModSecurity before 2.9.7 may allow for Web Appli
Incorrect handling of '\0' bytes in file uploads in ModSecurity before 2.9.7 may allow for Web Application Firewall bypasses and buffer over-reads on the Web Application Firewall when executing rules that read the FILES_TMP_CONTENT collection.
nvd
CVE-2022-48279HIGHCVSS 7.5fixed in 2.9.62023-01-20
CVE-2022-48279 [HIGH] CVE-2022-48279: In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed an
In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.
nvdosv
CVE-2021-42717HIGHCVSS 7.5≥ 2.0.0, < 2.9.52021-12-07
CVE-2021-42717 [HIGH] CWE-674 CVE-2021-42717: ModSecurity 3.x through 3.0.5 mishandles excessively nested JSON objects. Crafted JSON objects with
ModSecurity 3.x through 3.0.5 mishandles excessively nested JSON objects. Crafted JSON objects with nesting tens-of-thousands deep could result in the web server being unable to service legitimate requests. Even a moderately large (e.g., 300KB) HTTP request can occupy one of the limited NGINX worker processes for minutes and consume almost all of the a
nvdosv
CVE-2019-25043MEDIUMCVSS 5.3≥ 0, < 3.0.4-12021-05-06
CVE-2019-25043 [MEDIUM] CVE-2019-25043: ModSecurity 3
ModSecurity 3.x before 3.0.4 mishandles key-value pair parsing, as demonstrated by a "string index out of range" error and worker-process crash for a "Cookie: =abc" header.
osv
CVE-2020-15598HIGHCVSS 7.5≥ 0, < 3.0.4-22020-10-06
CVE-2020-15598 [HIGH] CVE-2020-15598: Trustwave ModSecurity 3
Trustwave ModSecurity 3.x through 3.0.4 allows denial of service via a special request. NOTE: The discoverer reports "Trustwave has signaled they are disputing our claims." The CVE suggests that there is a security issue with how ModSecurity handles regular expressions that can result in a Denial of Service condition. The vendor does not consider this as a security issue because1) there is no default configuration issue here. An attac
osv
CVE-2019-19886HIGHCVSS 7.5≥ 0, < 3.0.4-12020-01-21
CVE-2019-19886 [HIGH] CVE-2019-19886: Trustwave ModSecurity 3
Trustwave ModSecurity 3.0.0 through 3.0.3 allows an attacker to send crafted requests that may, when sent quickly in large volumes, lead to the server becoming slow or unresponsive (Denial of Service) because of a flaw in Transaction::addRequestHeader in transaction.cc.
osv
CVE-2013-5705MEDIUMCVSS 5.0fixed in 2.7.62014-04-15
CVE-2013-5705 [MEDIUM] CVE-2013-5705: apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using c
apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.
nvd
CVE-2013-2765MEDIUMCVSS 5.0PoCfixed in 2.7.42013-07-15
CVE-2013-2765 [MEDIUM] CWE-476 CVE-2013-2765: The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a de
The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.
nvd
CVE-2013-1915HIGHCVSS 7.5fixed in 2.7.32013-04-25
CVE-2013-1915 [HIGH] CWE-611 CVE-2013-1915: ModSecurity before 2.7.3 allows remote attackers to read arbitrary files, send HTTP requests to intr
ModSecurity before 2.7.3 allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) vulnerability.
nvd
CVE-2012-4528MEDIUMCVSS 5.0PoCfixed in 2.7.02012-12-28
CVE-2012-4528 [MEDIUM] CVE-2012-4528: The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass r
The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.
nvd
CVE-2012-2751MEDIUMCVSS 4.3fixed in 2.6.62012-07-22
CVE-2012-2751 [MEDIUM] CVE-2012-2751: ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the begi
ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks. NOTE:
nvd
CVE-2009-5031MEDIUMCVSS 4.3fixed in 2.5.112012-07-22
CVE-2009-5031 [MEDIUM] CWE-79 CVE-2009-5031: ModSecurity before 2.5.11 treats request parameter values containing single quotes as files, which a
ModSecurity before 2.5.11 treats request parameter values containing single quotes as files, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks via a single quote in a request parameter in the Content-Disposition field of a request with a multipart/form-data Content-Type header.
nvd
CVE-2009-1902MEDIUMCVSS 5.0PoCfixed in 2.5.92009-06-03
CVE-2009-1902 [MEDIUM] CWE-476 CVE-2009-1902: The multipart processor in ModSecurity before 2.5.9 allows remote attackers to cause a denial of ser
The multipart processor in ModSecurity before 2.5.9 allows remote attackers to cause a denial of service (crash) via a multipart form datapost request with a missing part header name, which triggers a NULL pointer dereference.
nvd
CVE-2009-1903MEDIUMCVSS 4.3fixed in 2.5.82009-06-03
CVE-2009-1903 [MEDIUM] CVE-2009-1903: The PDF XSS protection feature in ModSecurity before 2.5.8 allows remote attackers to cause a denial
The PDF XSS protection feature in ModSecurity before 2.5.8 allows remote attackers to cause a denial of service (Apache httpd crash) via a request for a PDF file that does not use the GET method.
nvd