Source: modsecurity-apache Version: 2.9.11-1 Severity: important Tags: upstream Forwarded: https://github.com/owasp-modsecurity/ModSecurity/issues/2514 X-Debbugs-Cc: [email protected]
Hi, The following vulnerability was published for modsecurity-apache. CVE-2025-54571[0]: | ModSecurity is an open source, cross platform web application | firewall (WAF) engine for Apache, IIS and Nginx. In versions 2.9.11 | and below, an attacker can override the HTTP response’s Content- | Type, which could lead to several issues depending on the HTTP | scenario. For example, we have demonstrated the potential for XSS | and arbitrary script source code disclosure in the latest version of | mod_security2. This issue is fixed in version 2.9.12. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-54571 https://www.cve.org/CVERecord?id=CVE-2025-54571 [1] https://github.com/owasp-modsecurity/ModSecurity/issues/2514 [2] https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-cg44-9m43-3f9v [3] https://github.com/owasp-modsecurity/ModSecurity/commit/dfbde557acc41d858dbe04d4b6eaec64478347ff Please adjust the affected versions in the BTS as needed. Regards, Salvatore

