CVE Vulnerabilities

CVE-2025-47947

Excessive Platform Resource Consumption within a Loop

Published: May 21, 2025 | Modified: Jun 20, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions up to and including 2.9.8 are vulnerable to denial of service in one special case (in stable released versions): when the payloads content type is application/json, and there is at least one rule which does a sanitiseMatchedBytes action. A patch is available at pull request 3389 and expected to be part of version 2.9.9. No known workarounds are available.

Weakness

The product has a loop body or loop condition that contains a control element that directly or indirectly consumes platform resources, e.g. messaging, sessions, locks, or file descriptors.

Affected Software

NameVendorStart VersionEnd Version
ModsecurityTrustwave*2.9.9 (excluding)
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-httpd-0:2.4.62-8.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_http2-0:2.0.29-5.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_jk-0:1.2.50-9.redhat_1.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_md-1:2.4.28-10.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_proxy_cluster-0:1.3.22-4.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_security-0:2.9.6-11.el8jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-httpd-0:2.4.62-8.el7jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_http2-0:2.0.29-5.el7jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_jk-0:1.2.50-9.redhat_1.el7jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_md-1:2.4.28-10.el7jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_proxy_cluster-0:1.3.22-4.el7jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_security-0:2.9.6-11.el7jbcs*
Red Hat Enterprise Linux 8RedHatmod_security-0:2.9.6-2.el8_10*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatmod_security-0:2.9.2-8.el8_2.1*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatmod_security-0:2.9.2-9.el8_4.1*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHatmod_security-0:2.9.2-9.el8_6.1*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHatmod_security-0:2.9.2-9.el8_6.1*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHatmod_security-0:2.9.2-9.el8_6.1*
Red Hat Enterprise Linux 8.8 Telecommunications Update ServiceRedHatmod_security-0:2.9.6-1.el8_8.1*
Red Hat Enterprise Linux 8.8 Update Services for SAP SolutionsRedHatmod_security-0:2.9.6-1.el8_8.1*
Red Hat Enterprise Linux 9RedHatmod_security-0:2.9.6-2.el9_6*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatmod_security-0:2.9.3-12.el9_0.1*
Red Hat Enterprise Linux 9.2 Update Services for SAP SolutionsRedHatmod_security-0:2.9.6-1.el9_2.1*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatmod_security-0:2.9.6-1.el9_4.1*
Red Hat JBoss Core Services 2.4.62.SP1RedHatjbcs-httpd24-mod_security*
Modsecurity-apacheUbuntubionic*
Modsecurity-apacheUbuntuesm-apps/bionic*
Modsecurity-apacheUbuntuesm-apps/focal*
Modsecurity-apacheUbuntuesm-apps/jammy*
Modsecurity-apacheUbuntuesm-apps/noble*
Modsecurity-apacheUbuntuesm-apps/xenial*
Modsecurity-apacheUbuntuesm-infra-legacy/trusty*
Modsecurity-apacheUbuntufocal*
Modsecurity-apacheUbuntujammy*
Modsecurity-apacheUbuntunoble*
Modsecurity-apacheUbuntuoracular*
Modsecurity-apacheUbuntuplucky*
Modsecurity-apacheUbuntutrusty*
Modsecurity-apacheUbuntutrusty/esm*
Modsecurity-apacheUbuntuupstream*
Modsecurity-apacheUbuntuxenial*

Extended Description

References