- Description
- A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty POST request when the OIDCPreservePost directive is enabled. The server crashes consistently, affecting availability.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
- secalert@redhat.com
- CWE-248
- nvd@nist.gov
- NVD-CWE-noinfo
- Hype score
- Not currently trending
‼️ CVE-2025-3891: SUSE fixes high-severity DoS flaw in apache2-mod_auth_openidc (CVSS 8.2). Patch ASAP if running: ✅ SUSE Linux 12 SP5 ✅ LTSS/Extended Security ✅ SAP Apps 📌 Patch cmd: Read more: 👉 https://t.co/WYfuLDCmzV #CyberRisk #SysAdmin https://t.co/6GLaV
@Cezar_H_Linux
20 May 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔐 CVE-2025-3891 (CVSS 8.2) in Apache2-mod_auth_openidc—Patch NOW! 🚀 Exploitable via empty Content-Type headers. 📌 Affects SUSE LE 12 SP5, SAP servers. 🔗Read more: 👉https://t.co/dUycX4Me6p #InfoSec #DevOps https://t.co/1lZRw
@Cezar_H_Linux
20 May 2025
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-3891 Denial of Service in Apache mod_auth_openidc via Empty POST Request https://t.co/N5ZKgEgXxp
@VulmonFeeds
29 Apr 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-3891 A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty… https://t.co/SsVH5iTASy
@CVEnew
29 Apr 2025
293 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D623D8C0-65D2-4269-A1D4-5CB3899F44C8"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
"vulnerable": true,
"matchCriteriaId": "053C1B35-3869-41C2-9551-044182DE0A64"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
}
],
"operator": "OR"
}
]
}
]