{"id":"CVE-2025-3891","summary":"Mod_auth_openidc: dos via empty post in mod_auth_openidc with oidcpreservepost enabled","details":"A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty POST request when the OIDCPreservePost directive is enabled. The server crashes consistently, affecting availability.","aliases":["BIT-apache-2025-3891","GHSA-x7cf-8wgv-5j86"],"modified":"2026-05-18T05:58:07.117196820Z","published":"2025-04-29T11:56:50.808Z","related":["ALSA-2025:4597","ALSA-2025:9396","CGA-w6p6-xxwm-cf9x","SUSE-SU-2025:01585-1","SUSE-SU-2025:01953-1","SUSE-SU-2025:01962-1","SUSE-SU-2025:4532-1"],"database_specific":{"cwe_ids":["CWE-248"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/3xxx/CVE-2025-3891.json","cna_assigner":"redhat"},"references":[{"type":"WEB","url":"https://access.redhat.com/downloads/content/package-browser/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00007.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:10002"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:10003"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:10004"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:10006"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:10007"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:10008"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:10010"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:4597"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:9396"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2025-3891"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/3xxx/CVE-2025-3891.json"},{"type":"ADVISORY","url":"https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-x7cf-8wgv-5j86"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-3891"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2361633"},{"type":"FIX","url":"https://github.com/OpenIDC/mod_auth_openidc/commit/6a0b5f66c87184dfe0e4400f6bdd46a82dc0ec2b"},{"type":"PACKAGE","url":"https://github.com/OpenIDC/mod_auth_openidc"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openidc/mod_auth_openidc","events":[{"introduced":"4fe40bd8bed0c7697f4fb2c3733d02d472cb849e"},{"fixed":"5050a96dca441a921c95521bff6e47caa40c750b"}]}],"versions":["v2.4.13","v2.4.12.3","v2.4.12.2","v2.4.12.1","v2.4.12","v2.4.11.3","v2.4.11.2","v2.4.11.1","v2.4.11","v2.4.10","v2.4.9.4","v2.4.9.3","v2.4.9.2","v2.4.9.1","v2.4.9","v2.4.8.4","v2.4.8.3","v2.4.8.2","v2.4.8.1","v2.4.7.2","v2.4.7.1","v2.4.7","v2.4.6","v2.4.5","v2.4.4.1","v2.4.4","v2.4.3","v2.4.2.1","v2.4.2","v2.4.1","v2.4.0.4","v2.4.0.3","v2.4.0.2","v2.4.0.1","v2.4.0","v2.3.11","2.3.11rc1","v2.3.10.2","v2.3.10.1","v2.3.10","v2.3.9","v2.3.8","v2.3.7","v2.3.6","v2.3.5","v2.3.4","v2.3.3","v2.3.2","v2.3.1","v2.3.0","v2.3.0rc3","v2.3.0rc0","v2.2.0","v2.1.6","v2.1.5","v2.1.4","v2.1.3","v2.1.2","v2.1.1","v2.1.0","v2.0.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-3891.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}