Cross-site Scripting (XSS) Affecting apache2-mod_security2 package, versions <2.9.4-150400.3.12.1


Severity

Recommended
0.0
medium
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.06% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Scripting (XSS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-SLES157-APACHE2MODSECURITY2-13157524
  • published30 Sept 2025
  • disclosed29 Sept 2025

Introduced: 29 Sep 2025

NewCVE-2025-54571  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade SLES:15.7 apache2-mod_security2 to version 2.9.4-150400.3.12.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream apache2-mod_security2 package and not the apache2-mod_security2 package as distributed by SLES. See How to fix? for SLES:15.7 relevant fixed versions and status.

ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. In versions 2.9.11 and below, an attacker can override the HTTP response’s Content-Type, which could lead to several issues depending on the HTTP scenario. For example, we have demonstrated the potential for XSS and arbitrary script source code disclosure in the latest version of mod_security2. This issue is fixed in version 2.9.12.

CVSS Base Scores

version 3.1