Vulnerability Description
ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. In versions 2.9.8 to before 2.9.11, an empty XML tag can cause a segmentation fault. If SecParseXmlIntoArgs is set to On or OnlyArgs, and the request type is application/xml, and at least one XML tag is empty (eg <foo></foo>), then a segmentation fault occurs. This issue has been patched in version 2.9.11. A workaround involves setting SecParseXmlIntoArgs to Off.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/owasp-modsecurity/ModSecurity/commit/ecd7b9736836eee391d25f35
- https://github.com/owasp-modsecurity/ModSecurity/security/advisories/GHSA-gw9c-4
FAQ
What is CVE-2025-52891?
CVE-2025-52891 is a vulnerability with a CVSS score of 6.5 (MEDIUM). ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. In versions 2.9.8 to before 2.9.11, an empty XML tag can cause a segmentation fault. If S...
How severe is CVE-2025-52891?
CVE-2025-52891 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-52891?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.