Home icon Chevron Chevron Blog Chevron News Chevron

High Severity DoS Vulnerability CVE-2025-47947 Identified in ModSecurity2

High Severity DoS Vulnerability CVE-2025-47947 Identified in ModSecurity2

May 23, 2025


A newly disclosed vulnerability in ModSecurity2 firewall, tracked as CVE-2025-47947, has raised concerns over potential Denial of Service (DoS) attacks under specific, rare conditions. The issue was officially published on May 21, 2025, and is rated 7.5 (High) on the CVSS scale.

The vulnerability was initially reported privately by a customer in March 2025. After initial attempts to reproduce the bug proved unsuccessful, further analysis and collaboration eventually uncovered the root cause. According to developers, the delay in resolving the issue was due to the complexity of reproducing the specific conditions under which the flaw manifests.

CVE-2025-47947 Technical Details

The issue lies in two specific non-disruptive actions within ModSecurity2: sanitiseMatched and sanitiseMatchedBytes. These actions are designed to obscure sensitive data in logs by replacing matched variables, such as argument names or values with an asterisk (*) in the audit log’s section C (request body).

When these actions are triggered, they iterate over matched arguments in the request body. In cases where argument names are duplicated with large payloads and the action may loop excessively. For example, a request containing 500 identical arguments would cause the engine to perform 500 x 500 iterations, leading to 250,000 items stored in memory for just one rule. Multiple such rules could further compound the issue, consuming excessive system resources and potentially leading to a Denial of Service.

This vulnerability only affects ModSecurity version 2.x and does not impact libmodsecurity3, which lacks support for the sanitiseMatched and sanitiseMatchedBytes actions.

Remediation of CVE-2025-47947

The development team has addressed the issue with the release of ModSecurity version 2.9.9. All users of ModSecurity2 are strongly advised to upgrade immediately to avoid potential exploitation.

In the course of addressing this vulnerability, the team identified areas for improvement in the sanitization process. Plans are underway to redesign the mechanism and potentially implement an enhanced version in libmodsecurity3, ensuring better performance and security against similar issues in the future.

Administrators using ModSecurity2 should update to version 2.9.9 without delay. Monitoring systems for abnormal memory or CPU usage may also help detect attempted exploitation of the vulnerability.

Source: hxxps[://]modsecurity[.]org/20250521/possible-dos-vulnerability-cve-2025-47947-2025-may/

Follow cybersecurity88 on X and LinkedIn for the latest cybersecurity news

Did you like the post? Share it in your media

Latest Articles

Featured

ISO-Based Malware Campaign Spreads RATs and Crypto Miners Through Fake Software Installers

April 02, 2026 · Chetna Sehgal

A new cyber campaign has been discovered where attackers are using fake software downloads to spr...

Read More >
Featured

Casbaneiro Banking Trojan Spreads Across Latin America Using Worm-Like Phishing Attacks

April 02, 2026 · Chetna Sehgal

A dangerous banking malware called Casbaneiro is currently spreading across Latin America and tar...

Read More >
Featured

Google Fixes Fourth Chrome Zero-Day Exploited in Active Attacks in 2026

April 01, 2026 · Chetna Sehgal

In a major cybersecurity update, Google has fixed multiple zero-day vulnerabilities in its Chrome...

Read More >
Featured

Claude Code Source Leak: Anthropic Confirms npm Packaging Error Exposed 500K+ Lines of Code

April 01, 2026 · Chetna Sehgal

In a recent incident that gained major attention in the tech world, Anthropic confirmed that part...

Read More >
Featured

Axios Supply Chain Attack Exposes Developers to Cross-Platform RAT via Compromised npm Account

March 31, 2026 · Chetna Sehgal

A serious cybersecurity issue has recently come up involving Axios, which is a very popular JavaS...

Read More >
Featured

Hacker Charged in $53 Million Uranium Finance Crypto Heist Linked to Smart Contract Exploit

March 31, 2026 · Chetna Sehgal

A major case of cryptocurrency theft has recently come into the spotlight, where a hacker has bee...

Read More >
Newsletter line