Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3891: Uncaught Exception

0
High
VulnerabilityCVE-2025-3891cvecve-2025-3891
Published: Tue Apr 29 2025 (04/29/2025, 11:56:50 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 8

Description

A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty POST request when the OIDCPreservePost directive is enabled. The server crashes consistently, affecting availability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:01:06 UTC

Technical Analysis

CVE-2025-3891 is a vulnerability identified in the mod_auth_openidc module version 2.0.0 used with Apache httpd on Red Hat Enterprise Linux 8. The flaw arises when the OIDCPreservePost directive is enabled, which is intended to preserve POST data during OpenID Connect authentication flows. An attacker can send an empty POST request to the server, which leads to an uncaught exception within the module's code. This exception causes the Apache httpd process to crash consistently, resulting in a denial of service (DoS) condition. The vulnerability can be exploited remotely without any authentication or user interaction, making it accessible to any attacker with network access to the affected server. The issue specifically impacts availability, as it does not compromise confidentiality or integrity of data. The CVSS v3.1 base score is 7.5, indicating a high severity due to the ease of exploitation (attack vector: network, attack complexity: low) and the complete loss of availability of the affected service. No known exploits have been reported in the wild as of the publication date, but the vulnerability is considered critical for environments relying on mod_auth_openidc for authentication. The flaw is rooted in improper handling of empty POST requests when preserving POST data, highlighting a need for improved input validation and exception handling within the module.

Potential Impact

The primary impact of CVE-2025-3891 is a denial of service on web servers running Apache httpd with the vulnerable mod_auth_openidc module and the OIDCPreservePost directive enabled. This can lead to service outages, disrupting access to web applications that rely on OpenID Connect authentication. Organizations using this module for single sign-on or federated identity management may experience downtime, affecting user productivity and potentially causing business interruptions. The vulnerability does not expose sensitive data or allow unauthorized access, but the loss of availability can have cascading effects, especially for critical infrastructure or high-availability environments. Attackers can exploit this flaw remotely without credentials, increasing the risk of widespread disruption. The impact is particularly severe for organizations with public-facing authentication services or those that cannot quickly apply patches or mitigations. Additionally, repeated crashes could lead to resource exhaustion or complicate incident response efforts.

Mitigation Recommendations

To mitigate CVE-2025-3891, organizations should first verify if the OIDCPreservePost directive is enabled in their mod_auth_openidc configuration. If it is not required, disabling this directive can prevent the vulnerability from being triggered. Applying vendor-supplied patches or updates for mod_auth_openidc as soon as they become available is critical. In the absence of an immediate patch, implementing web application firewall (WAF) rules to block or rate-limit empty POST requests targeting the affected endpoints can reduce exposure. Monitoring Apache httpd logs for unusual empty POST requests or repeated crashes can help detect exploitation attempts. Additionally, deploying redundancy and failover mechanisms can minimize downtime if a DoS occurs. Security teams should also review and test their incident response plans to handle potential service outages caused by this vulnerability. Finally, keeping the mod_auth_openidc module and Apache httpd updated with the latest stable releases will help prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-04-23T06:53:53.124Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6858

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 2/27/2026, 2:01:06 PM

Last updated: 3/25/2026, 1:11:56 PM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses