Bug 2375926 (CVE-2025-52891) - CVE-2025-52891 mod_security: ModSecurity segmentation fault
Summary: CVE-2025-52891 mod_security: ModSecurity segmentation fault
Keywords:
Status: NEW
Alias: CVE-2025-52891
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2375950 2375952 2375953
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-07-02 16:01 UTC by OSIDB Bzimport
Modified: 2025-07-02 17:09 UTC (History)
5 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-07-02 16:01:13 UTC
ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. In versions 2.9.8 to before 2.9.11, an empty XML tag can cause a segmentation fault. If SecParseXmlIntoArgs is set to On or OnlyArgs, and the request type is application/xml, and at least one XML tag is empty (eg <foo></foo>), then a segmentation fault occurs. This issue has been patched in version 2.9.11. A workaround involves setting SecParseXmlIntoArgs to Off.


Note You need to log in before you can comment on or make changes to this bug.