CVE-2025-52891

6.5 MEDIUM

📋 TL;DR

This vulnerability in ModSecurity causes a segmentation fault when processing XML requests containing empty tags, leading to denial of service. It affects ModSecurity installations with SecParseXmlIntoArgs enabled and processing application/xml content. The vulnerability can crash the WAF, potentially exposing backend applications to attacks.

💻 Affected Systems

Products:
  • ModSecurity
Versions: 2.9.8 to 2.9.10
Operating Systems: All platforms running ModSecurity
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when SecParseXmlIntoArgs is set to On or OnlyArgs and processing application/xml requests with empty XML tags.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete WAF failure allowing unfiltered attacks to reach backend applications, potentially leading to data breaches or system compromise.

🟠

Likely Case

Denial of service causing WAF to crash, requiring manual restart and temporary loss of web application protection.

🟢

If Mitigated

Minimal impact if workaround is applied or vulnerable configuration is not used.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple XML payload can trigger the crash without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.9.11

Vendor Advisory: https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-gw9c-4wfm-vj3x

Restart Required: Yes

Instructions:

1. Download ModSecurity 2.9.11 from official repository. 2. Follow standard installation procedures for your platform. 3. Restart web server to apply changes.

🔧 Temporary Workarounds

Disable XML parsing into arguments

all

Set SecParseXmlIntoArgs to Off to prevent the vulnerable code path from being triggered.

SecParseXmlIntoArgs Off

🧯 If You Can't Patch

  • Implement network filtering to block or sanitize XML requests with empty tags before reaching ModSecurity.
  • Deploy additional WAF or reverse proxy layer to handle XML parsing before requests reach vulnerable ModSecurity instance.

🔍 How to Verify

Check if Vulnerable:

Check ModSecurity version and configuration: 1. Verify version is between 2.9.8-2.9.10. 2. Check if SecParseXmlIntoArgs is On or OnlyArgs.

Check Version:

modsecurity -V

Verify Fix Applied:

1. Confirm version is 2.9.11 or higher. 2. Test with XML request containing empty tags to ensure no segmentation fault occurs.

📡 Detection & Monitoring

Log Indicators:

  • Segmentation fault errors in web server logs
  • ModSecurity process crashes
  • Unusual XML requests with empty tags

Network Indicators:

  • Spike in XML requests with empty tags
  • Web server becoming unresponsive after XML requests

SIEM Query:

source="modsecurity.log" AND ("segmentation fault" OR "SIGSEGV" OR "crash")

🔗 References

📤 Share & Export