CVSS 3.1 Score 8.6 of 10 (high)


Published Jan 30, 2024
Updated: Feb 20, 2024


CVE-2024-1019 is a vulnerability affecting ModSecurity and libModSecurity versions 3.0.0 to 3.0.11, allowing for a bypass of the Web Application Firewall (WAF). The vulnerability occurs when specially crafted request URLs with path-based payloads are submitted. ModSecurity v3 decodes percent-encoded characters in the URL before separating the path component from the query string component, causing an impedance mismatch with RFC compliant back-end applications. This allows an attacker to hide an attack payload in the URL path from WAF rules. To remediate this vulnerability, users are advised to upgrade to version 3.0.12 of ModSecurity or libModSecurity. The potential danger posed is high, as it can lead to a compromise of the back-end system if it uses the path component of request URLs to construct queries.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.


Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-1019 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions