Unrated severityOSV Advisory· Published Apr 29, 2025· Updated Nov 11, 2025
Mod_auth_openidc: dos via empty post in mod_auth_openidc with oidcpreservepost enabled
CVE-2025-3891
Description
A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty POST request when the OIDCPreservePost directive is enabled. The server crashes consistently, affecting availability.
Affected products
432.3.11rc1, v1.5, v1.5.1, …+ 1 more
- (no CPE)range: 2.3.11rc1, v1.5, v1.5.1, …
- (no CPE)
- osv-coords41 versionspkg:apk/chainguard/apache2pkg:apk/chainguard/apache2-compatpkg:apk/chainguard/apache2-configpkg:apk/chainguard/apache2-config-compatpkg:apk/chainguard/apache2-datapkg:apk/chainguard/apache2-devpkg:apk/chainguard/apache2-docpkg:apk/chainguard/apache2-oci-entrypointpkg:apk/chainguard/apache2-utilspkg:apk/wolfi/apache2pkg:apk/wolfi/apache2-compatpkg:apk/wolfi/apache2-configpkg:apk/wolfi/apache2-config-compatpkg:apk/wolfi/apache2-datapkg:apk/wolfi/apache2-devpkg:apk/wolfi/apache2-docpkg:apk/wolfi/apache2-oci-entrypointpkg:apk/wolfi/apache2-utilspkg:bitnami/apachepkg:rpm/almalinux/cjosepkg:rpm/almalinux/cjose-develpkg:rpm/almalinux/mod_auth_openidcpkg:rpm/opensuse/apache2-mod_auth_openidc&distro=openSUSE%20Leap%2015.6pkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6pkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP7pkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Manager%20Proxy%204.3pkg:rpm/suse/apache2-mod_auth_openidc&distro=SUSE%20Manager%20Server%204.3
< 0+ 40 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)
- (no CPE)range: < 0.6.1-4.module_el8.9.0+3631+0ced13d7
- (no CPE)range: < 0.6.1-4.module_el8.9.0+3631+0ced13d7
- (no CPE)range: < 2.4.9.4-8.module_el8.10.0+3988+526f0275
- (no CPE)range: < 2.3.8-150600.16.11.1
- (no CPE)range: < 2.3.8-150100.3.34.1
- (no CPE)range: < 2.3.8-150100.3.34.1
- (no CPE)range: < 2.3.8-150100.3.34.1
- (no CPE)range: < 2.3.8-150100.3.34.1
- (no CPE)range: < 2.3.8-150100.3.34.1
- (no CPE)range: < 2.3.8-150100.3.34.1
- (no CPE)range: < 2.3.8-150600.16.11.1
- (no CPE)range: < 2.3.8-150600.16.11.1
- (no CPE)range: < 2.4.0-7.22.1
- (no CPE)range: < 2.3.8-150100.3.34.1
- (no CPE)range: < 2.3.8-150100.3.34.1
- (no CPE)range: < 2.3.8-150100.3.34.1
- (no CPE)range: < 2.3.8-150100.3.34.1
- (no CPE)range: < 2.3.8-150100.3.34.1
- (no CPE)range: < 2.3.8-150100.3.34.1
- (no CPE)range: < 2.4.0-7.22.1
- (no CPE)range: < 2.3.8-150100.3.34.1
- (no CPE)range: < 2.3.8-150100.3.34.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- access.redhat.com/errata/RHSA-2025:10002mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2025:10003mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2025:10004mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2025:10006mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2025:10007mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2025:10008mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2025:10010mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2025:4597mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2025:9396mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/security/cve/CVE-2025-3891mitrevdb-entryx_refsource_REDHAT
- bugzilla.redhat.com/show_bug.cgimitreissue-trackingx_refsource_REDHAT
- github.com/OpenIDC/mod_auth_openidc/commit/6a0b5f66c87184dfe0e4400f6bdd46a82dc0ec2bmitre
- github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-x7cf-8wgv-5j86mitre
News mentions
0No linked articles in our index yet.