CVE-2022-39955
ModSecurity vulnerability analysis and mitigation

Overview

The OWASP ModSecurity Core Rule Set (CRS) vulnerability (CVE-2022-39955) was discovered in September 2022. This vulnerability allows a partial rule set bypass through a specially crafted HTTP Content-Type header field that indicates multiple character encoding schemes. The vulnerability affects legacy CRS versions 3.0.x and 3.1.x, as well as versions 3.2.1 and 3.3.2 (CRS Project).

Technical details

The vulnerability enables attackers to bypass the configurable CRS Content-Type header charset allow list by declaring multiple Content-Type charset names. When exploited, an encoded payload can bypass CRS detection and may then be decoded by the backend. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 CRITICAL by NVD and 7.3 HIGH by Switzerland Government Common Vulnerability Program (NVD).

Impact

When successfully exploited, this vulnerability allows attackers to bypass the web application firewall's protection mechanisms. The bypass specifically affects the processing of HTTP Content-Type headers, potentially allowing malicious payloads to reach the backend server without being detected by the security rules (CRS Project).

Mitigation and workarounds

Users and integrators are advised to upgrade to CRS versions 3.2.2 and 3.3.3 or later to address this vulnerability. For Debian 10 buster, the fix has been implemented in version 3.2.3-0+deb10u3. System administrators should review their ModSecurity configuration, particularly the content in /etc/modsecurity/modsecurity.conf, against the updated recommended configuration (Debian LTS).

Additional resources


SourceThis report was generated using AI

Related ModSecurity vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-27110HIGH7.9
  • ModSecurityModSecurity
  • cpe:2.3:a:trustwave:modsecurity
NoYesFeb 25, 2025
CVE-2025-48866HIGH7.5
  • Rocky LinuxRocky Linux
  • modsecurity-apache
NoYesJun 02, 2025
CVE-2025-47947HIGH7.5
  • Rocky LinuxRocky Linux
  • mod_security
NoYesMay 21, 2025
CVE-2025-54571MEDIUM6.9
  • ModSecurityModSecurity
  • cpe:2.3:a:owasp:modsecurity
NoYesAug 06, 2025
CVE-2025-52891MEDIUM6.5
  • ModSecurityModSecurity
  • modsecurity-apache
NoYesJul 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management