Source: modsecurity-apache
Version: 2.9.11-1
Severity: important
Tags: upstream
Forwarded: https://github.com/owasp-modsecurity/ModSecurity/issues/2514
X-Debbugs-Cc: [email protected]

Hi,

The following vulnerability was published for modsecurity-apache.

CVE-2025-54571[0]:
| ModSecurity is an open source, cross platform web application
| firewall (WAF) engine for Apache, IIS and Nginx. In versions 2.9.11
| and below, an attacker can override the HTTP response’s Content-
| Type, which could lead to several issues depending on the HTTP
| scenario. For example, we have demonstrated the potential for XSS
| and arbitrary script source code disclosure in the latest version of
| mod_security2. This issue is fixed in version 2.9.12.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-54571
    https://www.cve.org/CVERecord?id=CVE-2025-54571
[1] https://github.com/owasp-modsecurity/ModSecurity/issues/2514
[2] 
https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-cg44-9m43-3f9v
[3] 
https://github.com/owasp-modsecurity/ModSecurity/commit/dfbde557acc41d858dbe04d4b6eaec64478347ff

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to