Skip to main content

CVE-2025-48866: CWE-1050: Excessive Platform Resource Consumption within a Loop in owasp-modsecurity ModSecurity

High
VulnerabilityCVE-2025-48866cvecve-2025-48866cwe-1050
Published: Mon Jun 02 2025 (06/02/2025, 15:46:19 UTC)
Source: CVE Database V5
Vendor/Project: owasp-modsecurity
Product: ModSecurity

Description

ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to 2.9.10 contain a denial of service vulnerability similar to GHSA-859r-vvv8-rm8r/CVE-2025-47947. The `sanitiseArg` (and `sanitizeArg` - this is the same action but an alias) is vulnerable to adding an excessive number of arguments, thereby leading to denial of service. Version 2.9.10 fixes the issue. As a workaround, avoid using rules that contain the `sanitiseArg` (or `sanitizeArg`) action.

AI-Powered Analysis

AILast updated: 07/11/2025, 02:33:13 UTC

Technical Analysis

CVE-2025-48866 is a high-severity denial of service (DoS) vulnerability affecting versions of the open source web application firewall (WAF) engine ModSecurity prior to 2.9.10. ModSecurity is widely used as a cross-platform WAF for Apache, IIS, and Nginx web servers to protect web applications from various attacks. The vulnerability arises from the `sanitiseArg` (and its alias `sanitizeArg`) action within ModSecurity rules. This action is designed to sanitize input arguments, but due to improper handling, it can be exploited to add an excessive number of arguments in a loop. This excessive resource consumption leads to a denial of service condition by exhausting platform resources such as CPU and memory, causing the WAF process or the hosting web server to become unresponsive or crash. The vulnerability is similar to a previously disclosed issue (CVE-2025-47947) and is tracked under CWE-1050, which relates to excessive resource consumption within a loop. The CVSS 3.1 base score is 7.5, indicating a high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but a high impact on availability (A:H). No known exploits are currently reported in the wild, and the issue is fixed in ModSecurity version 2.9.10. Until upgrading, the recommended workaround is to avoid using rules that contain the `sanitiseArg` or `sanitizeArg` actions to prevent triggering the vulnerability.

Potential Impact

For European organizations deploying ModSecurity as part of their web application security stack, this vulnerability poses a significant risk of denial of service. An attacker can remotely trigger the excessive resource consumption without authentication or user interaction, potentially causing the WAF or the underlying web server to become unavailable. This can lead to service outages, impacting business continuity, customer access, and potentially causing financial and reputational damage. Since ModSecurity is often deployed in front of critical web applications, the disruption could affect e-commerce platforms, government portals, financial services, and other sectors reliant on continuous web availability. The lack of confidentiality or integrity impact means data breaches are unlikely from this vulnerability alone, but the availability impact can be severe. Additionally, denial of service conditions can be leveraged as part of multi-stage attacks or to distract security teams. The absence of known exploits in the wild suggests that proactive patching can effectively mitigate risk before widespread exploitation occurs.

Mitigation Recommendations

European organizations should prioritize upgrading ModSecurity to version 2.9.10 or later, where this vulnerability is fixed. If immediate upgrading is not feasible, administrators should audit their ModSecurity rulesets to identify and disable any rules that use the `sanitiseArg` or `sanitizeArg` actions, as these are the vectors triggering the excessive resource consumption. Monitoring WAF logs for unusual spikes in argument processing or resource usage can help detect attempted exploitation. Implementing rate limiting and web server resource controls can also help mitigate the impact of potential DoS attempts. Organizations should ensure their incident response and business continuity plans account for potential WAF outages. Finally, maintaining an up-to-date inventory of ModSecurity deployments and versions across the infrastructure will facilitate timely patch management and vulnerability remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-05-27T20:14:34.294Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dca2c182aa0cae24b06a9

Added to database: 6/2/2025, 3:58:36 PM

Last enriched: 7/11/2025, 2:33:13 AM

Last updated: 7/13/2025, 3:48:24 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats