CVE-2022-39955: CWE-863 Incorrect Authorization in OWASP ModSecurity Core Rule Set
The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass by submitting a specially crafted HTTP Content-Type header field that indicates multiple character encoding schemes. A vulnerable back-end can potentially be exploited by declaring multiple Content-Type "charset" names and therefore bypassing the configurable CRS Content-Type header "charset" allow list. An encoded payload can bypass CRS detection this way and may then be decoded by the backend. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively.
AI Analysis
Technical Summary
CVE-2022-39955 is a high-severity vulnerability (CVSS 7.3) affecting the OWASP ModSecurity Core Rule Set (CRS), specifically versions 3.0.x, 3.1.x, 3.2.1, and 3.3.2. The vulnerability arises from incorrect authorization logic (CWE-863) within the CRS rules that handle HTTP Content-Type header parsing. Attackers can craft an HTTP request with a Content-Type header containing multiple character encoding declarations (multiple charset names). This malformed header can bypass the CRS's configurable allow list for Content-Type charset values, allowing an encoded malicious payload to evade detection by the CRS. Once bypassed, the backend server may decode and process the payload, potentially leading to unauthorized actions or exploitation of backend vulnerabilities. The issue affects legacy and current CRS versions, with fixed versions 3.2.2 and 3.3.3 released to address this bypass. No known exploits are reported in the wild yet, but the vulnerability's nature allows remote exploitation without authentication or user interaction, increasing risk. The vulnerability impacts confidentiality, integrity, and availability due to the potential for malicious payloads to bypass web application firewall (WAF) protections and reach vulnerable backend systems.
Potential Impact
For European organizations, this vulnerability poses a significant risk to web applications protected by the OWASP ModSecurity CRS, especially those using affected versions. Successful exploitation can allow attackers to bypass WAF protections, enabling injection of malicious payloads that could lead to data leakage, unauthorized access, or service disruption. This is particularly critical for sectors handling sensitive personal data under GDPR, such as finance, healthcare, and government services. The bypass could facilitate exploitation of backend vulnerabilities, leading to compromise of confidentiality and integrity of data, and potentially availability if denial-of-service or destructive payloads are delivered. Organizations relying on ModSecurity CRS as a primary defense layer may find their security posture weakened until patches are applied. The lack of required authentication and user interaction means attackers can exploit this remotely and at scale, increasing the threat surface for European enterprises.
Mitigation Recommendations
European organizations should immediately assess their use of OWASP ModSecurity CRS and identify if affected versions (3.0.x, 3.1.x, 3.2.1, 3.3.2) are deployed. The primary mitigation is to upgrade to the patched versions 3.2.2 or 3.3.3, which address the charset header parsing bypass. Additionally, organizations should implement strict input validation on backend systems to not rely solely on CRS for Content-Type charset enforcement. Web servers and application frameworks should be configured to reject or sanitize HTTP headers with multiple charset declarations. Monitoring and logging of HTTP headers for anomalies can help detect exploitation attempts. Employing defense-in-depth by combining CRS with other security controls such as runtime application self-protection (RASP) and backend validation will reduce risk. Regular vulnerability scanning and penetration testing focusing on WAF bypass techniques should be conducted. Finally, organizations should stay updated on any emerging exploit reports and apply security advisories promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland
CVE-2022-39955: CWE-863 Incorrect Authorization in OWASP ModSecurity Core Rule Set
Description
The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass by submitting a specially crafted HTTP Content-Type header field that indicates multiple character encoding schemes. A vulnerable back-end can potentially be exploited by declaring multiple Content-Type "charset" names and therefore bypassing the configurable CRS Content-Type header "charset" allow list. An encoded payload can bypass CRS detection this way and may then be decoded by the backend. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively.
AI-Powered Analysis
Technical Analysis
CVE-2022-39955 is a high-severity vulnerability (CVSS 7.3) affecting the OWASP ModSecurity Core Rule Set (CRS), specifically versions 3.0.x, 3.1.x, 3.2.1, and 3.3.2. The vulnerability arises from incorrect authorization logic (CWE-863) within the CRS rules that handle HTTP Content-Type header parsing. Attackers can craft an HTTP request with a Content-Type header containing multiple character encoding declarations (multiple charset names). This malformed header can bypass the CRS's configurable allow list for Content-Type charset values, allowing an encoded malicious payload to evade detection by the CRS. Once bypassed, the backend server may decode and process the payload, potentially leading to unauthorized actions or exploitation of backend vulnerabilities. The issue affects legacy and current CRS versions, with fixed versions 3.2.2 and 3.3.3 released to address this bypass. No known exploits are reported in the wild yet, but the vulnerability's nature allows remote exploitation without authentication or user interaction, increasing risk. The vulnerability impacts confidentiality, integrity, and availability due to the potential for malicious payloads to bypass web application firewall (WAF) protections and reach vulnerable backend systems.
Potential Impact
For European organizations, this vulnerability poses a significant risk to web applications protected by the OWASP ModSecurity CRS, especially those using affected versions. Successful exploitation can allow attackers to bypass WAF protections, enabling injection of malicious payloads that could lead to data leakage, unauthorized access, or service disruption. This is particularly critical for sectors handling sensitive personal data under GDPR, such as finance, healthcare, and government services. The bypass could facilitate exploitation of backend vulnerabilities, leading to compromise of confidentiality and integrity of data, and potentially availability if denial-of-service or destructive payloads are delivered. Organizations relying on ModSecurity CRS as a primary defense layer may find their security posture weakened until patches are applied. The lack of required authentication and user interaction means attackers can exploit this remotely and at scale, increasing the threat surface for European enterprises.
Mitigation Recommendations
European organizations should immediately assess their use of OWASP ModSecurity CRS and identify if affected versions (3.0.x, 3.1.x, 3.2.1, 3.3.2) are deployed. The primary mitigation is to upgrade to the patched versions 3.2.2 or 3.3.3, which address the charset header parsing bypass. Additionally, organizations should implement strict input validation on backend systems to not rely solely on CRS for Content-Type charset enforcement. Web servers and application frameworks should be configured to reject or sanitize HTTP headers with multiple charset declarations. Monitoring and logging of HTTP headers for anomalies can help detect exploitation attempts. Employing defense-in-depth by combining CRS with other security controls such as runtime application self-protection (RASP) and backend validation will reduce risk. Regular vulnerability scanning and penetration testing focusing on WAF bypass techniques should be conducted. Finally, organizations should stay updated on any emerging exploit reports and apply security advisories promptly.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- NCSC.ch
- Date Reserved
- 2022-09-05T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68386826182aa0cae2801b6e
Added to database: 5/29/2025, 1:59:02 PM
Last enriched: 7/8/2025, 3:10:41 AM
Last updated: 2/5/2026, 3:49:31 AM
Views: 119
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10314: CWE-276 Incorrect Default Permissions in Mitsubishi Electric Corporation FREQSHIP-mini for Windows
HighCVE-2025-11730: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
HighCVE-2026-1898: Improper Access Controls in WeKan
MediumCVE-2026-1897: Missing Authorization in WeKan
MediumCVE-2026-1896: Improper Access Controls in WeKan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.