{"id":"CVE-2025-48866","summary":"ModSecurity has possible DoS vulnerability in sanitiseArg action","details":"ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to 2.9.10 contain a denial of service vulnerability similar to GHSA-859r-vvv8-rm8r/CVE-2025-47947. The `sanitiseArg` (and `sanitizeArg` - this is the same action but an alias) is vulnerable to adding an excessive number of arguments, thereby leading to denial of service. Version 2.9.10 fixes the issue. As a workaround, avoid using rules that contain the  `sanitiseArg` (or `sanitizeArg`) action.","aliases":["BIT-modsecurity-2025-48866","BIT-modsecurity2-2025-48866"],"modified":"2026-04-02T12:50:29.402225Z","published":"2025-06-02T15:46:19.909Z","related":["GHSA-859r-vvv8-rm8r","GHSA-f82j-8pp7-cw2w","MGASA-2025-0192","SUSE-SU-2025:02028-1","SUSE-SU-2025:02029-1","SUSE-SU-2025:02052-1","openSUSE-SU-2025:15197-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/48xxx/CVE-2025-48866.json","cwe_ids":["CWE-1050"],"cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/owasp-modsecurity/ModSecurity/wiki/Reference-Manual-(v2.x)#sanitisearg"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/06/msg00009.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/48xxx/CVE-2025-48866.json"},{"type":"ADVISORY","url":"https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-859r-vvv8-rm8r"},{"type":"ADVISORY","url":"https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-f82j-8pp7-cw2w"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-48866"},{"type":"FIX","url":"https://github.com/owasp-modsecurity/ModSecurity/commit/3a54ccea62d3f7151bb08cb78d60c5e90b53ca2e"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/owasp-modsecurity/modsecurity","events":[{"introduced":"0"},{"fixed":"0923377d6d618e4cf6cc56ac67ce385bb60127e9"}]}],"versions":["v2.1.0","v2.1.0-rc7","v2.1.1","v2.1.1-dev2","v2.1.1-dev3","v2.1.1-dev4","v2.1.1-rc1","v2.1.1-rc2","v2.1.2","v2.1.2-rc1","v2.1.2-rc2","v2.1.2-rc3","v2.1.3","v2.1.3-rc1","v2.1.3-rc2","v2.1.4","v2.1.4-rc1","v2.1.4-rc2","v2.1.4-rc3","v2.1.4-rc4","v2.1.5","v2.1.5-rc1","v2.1.6","v2.1.6-rc1","v2.1.7","v2.2.0-dev1","v2.5.0","v2.5.0-dev2","v2.5.0-rc1","v2.5.0-rc2","v2.5.0-rc3","v2.5.0-rc3-pre2","v2.5.0-rc4","v2.5.1","v2.5.1-rc1","v2.5.10","v2.5.10-dev1","v2.5.10-dev2","v2.5.10-dev3","v2.5.11","v2.5.12","v2.5.13","v2.5.2","v2.5.3","v2.5.4","v2.5.5","v2.5.6","v2.5.7","v2.5.7-rc1","v2.5.8","v2.5.9","v2.6.0","v2.6.0-rc1","v2.6.0-rc2","v2.6.1","v2.6.2","v2.6.2-rc1","v2.6.3","v2.6.3-rc1","v2.6.4","v2.6.4-rc1","v2.6.5","v2.6.6","v2.6.7","v2.6.8","v2.7.0","v2.7.0-rc1","v2.7.0-rc3","v2.7.1","v2.7.2","v2.7.3","v2.7.4","v2.7.5","v2.7.6","v2.7.7","v2.8.0","v2.8.0-rc1","v2.9.0","v2.9.0-rc1","v2.9.0-rc2","v2.9.1","v2.9.1-rc1","v2.9.2","v2.9.3","v2.9.4","v2.9.5","v2.9.6","v2.9.7","v2.9.8","v2.9.9","v3.0.0","v3.0.0-rc1","v3.0.1","v3.0.10","v3.0.11","v3.0.12","v3.0.13","v3.0.14","v3.0.2","v3.0.3","v3.0.4","v3.0.5","v3.0.6","v3.0.7","v3.0.8","v3.0.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-48866.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}