trustwave CVE Vulnerabilities & Metrics

Focus on trustwave vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About trustwave Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with trustwave. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total trustwave CVEs: 12
Earliest CVE date: 03 Jun 2009, 17:00 UTC
Latest CVE date: 25 Feb 2025, 20:15 UTC

Latest CVE reference: CVE-2025-27110

Rolling Stats

30-day Count (Rolling): 1
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -66.67%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -66.67%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical trustwave CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.85

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 6
4.0-6.9 14
7.0-8.9 1
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS trustwave CVEs

These are the five CVEs with the highest CVSS scores for trustwave, sorted by severity first and recency.

All CVEs for trustwave

CVE-2025-27110 trustwave vulnerability CVSS: 0 25 Feb 2025, 20:15 UTC

Libmodsecurity is one component of the ModSecurity v3 project. The library codebase serves as an interface to ModSecurity Connectors taking in web traffic and applying traditional ModSecurity processing. A bug that exists only in Libmodsecurity3 version 3.0.13 means that, in 3.0.13, Libmodsecurity3 can't decode encoded HTML entities if they contains leading zeroes. Version 3.0.14 contains a fix. No known workarounds are available.

CVE-2024-1019 trustwave vulnerability CVSS: 0 30 Jan 2024, 16:15 UTC

ModSecurity / libModSecurity 3.0.0 to 3.0.11 is affected by a WAF bypass for path-based payloads submitted via specially crafted request URLs. ModSecurity v3 decodes percent-encoded characters present in request URLs before it separates the URL path component from the optional query string component. This results in an impedance mismatch versus RFC compliant back-end applications. The vulnerability hides an attack payload in the path component of the URL from WAF rules inspecting it. A back-end may be vulnerable if it uses the path component of request URLs to construct queries. Integrators and users are advised to upgrade to 3.0.12. The ModSecurity v2 release line is not affected by this vulnerability.

CVE-2023-38285 trustwave vulnerability CVSS: 0 26 Jul 2023, 21:15 UTC

Trustwave ModSecurity 3.x before 3.0.10 has Inefficient Algorithmic Complexity.

CVE-2023-28882 trustwave vulnerability CVSS: 0 28 Apr 2023, 04:15 UTC

Trustwave ModSecurity 3.0.5 through 3.0.8 before 3.0.9 allows a denial of service (worker crash and unresponsiveness) because some inputs cause a segfault in the Transaction class for some configurations.

CVE-2023-24021 trustwave vulnerability CVSS: 0 20 Jan 2023, 19:15 UTC

Incorrect handling of '\0' bytes in file uploads in ModSecurity before 2.9.7 may allow for Web Application Firewall bypasses and buffer over-reads on the Web Application Firewall when executing rules that read the FILES_TMP_CONTENT collection.

CVE-2022-48279 trustwave vulnerability CVSS: 0 20 Jan 2023, 19:15 UTC

In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.

CVE-2021-42717 trustwave vulnerability CVSS: 5.0 07 Dec 2021, 22:15 UTC

ModSecurity 3.x through 3.0.5 mishandles excessively nested JSON objects. Crafted JSON objects with nesting tens-of-thousands deep could result in the web server being unable to service legitimate requests. Even a moderately large (e.g., 300KB) HTTP request can occupy one of the limited NGINX worker processes for minutes and consume almost all of the available CPU on the machine. Modsecurity 2 is similarly vulnerable: the affected versions include 2.8.0 through 2.9.4.

CVE-2019-25043 trustwave vulnerability CVSS: 5.0 06 May 2021, 17:15 UTC

ModSecurity 3.x before 3.0.4 mishandles key-value pair parsing, as demonstrated by a "string index out of range" error and worker-process crash for a "Cookie: =abc" header.

CVE-2020-15598 trustwave vulnerability CVSS: 5.0 06 Oct 2020, 14:15 UTC

Trustwave ModSecurity 3.x through 3.0.4 allows denial of service via a special request. NOTE: The discoverer reports "Trustwave has signaled they are disputing our claims." The CVE suggests that there is a security issue with how ModSecurity handles regular expressions that can result in a Denial of Service condition. The vendor does not consider this as a security issue because1) there is no default configuration issue here. An attacker would need to know that a rule using a potentially problematic regular expression was in place, 2) the attacker would need to know the basic nature of the regular expression itself to exploit any resource issues. It's well known that regular expression usage can be taxing on system resources regardless of the use case. It is up to the administrator to decide on when it is appropriate to trade resources for potential security benefit

CVE-2019-19886 trustwave vulnerability CVSS: 5.0 21 Jan 2020, 22:15 UTC

Trustwave ModSecurity 3.0.0 through 3.0.3 allows an attacker to send crafted requests that may, when sent quickly in large volumes, lead to the server becoming slow or unresponsive (Denial of Service) because of a flaw in Transaction::addRequestHeader in transaction.cc.

CVE-2018-13065 trustwave vulnerability CVSS: 4.3 03 Jul 2018, 12:29 UTC

ModSecurity 3.0.0 has XSS via an onerror attribute of an IMG element. NOTE: a third party has disputed this issue because it may only apply to environments without a Core Rule Set configured

CVE-2017-18001 trustwave vulnerability CVSS: 10.0 31 Dec 2017, 19:29 UTC

Trustwave Secure Web Gateway (SWG) through 11.8.0.27 allows remote attackers to append an arbitrary public key to the device's SSH Authorized Keys data, and consequently obtain remote root access, via the publicKey parameter to the /sendKey URI.

CVE-2013-5705 trustwave vulnerability CVSS: 5.0 15 Apr 2014, 10:55 UTC

apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.

CVE-2013-2765 trustwave vulnerability CVSS: 5.0 15 Jul 2013, 15:55 UTC

The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.

CVE-2013-1915 trustwave vulnerability CVSS: 7.5 25 Apr 2013, 23:55 UTC

ModSecurity before 2.7.3 allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML external entity declaration in conjunction with an entity reference, aka an XML External Entity (XXE) vulnerability.

CVE-2012-4528 trustwave vulnerability CVSS: 5.0 28 Dec 2012, 11:48 UTC

The mod_security2 module before 2.7.0 for the Apache HTTP Server allows remote attackers to bypass rules, and deliver arbitrary POST data to a PHP application, via a multipart request in which an invalid part precedes the crafted data.

CVE-2012-2751 trustwave vulnerability CVSS: 4.3 22 Jul 2012, 16:55 UTC

ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031.

CVE-2009-5031 trustwave vulnerability CVSS: 4.3 22 Jul 2012, 16:55 UTC

ModSecurity before 2.5.11 treats request parameter values containing single quotes as files, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks via a single quote in a request parameter in the Content-Disposition field of a request with a multipart/form-data Content-Type header.

CVE-2011-1906 trustwave vulnerability CVSS: 5.0 05 May 2011, 14:55 UTC

Trustwave WebDefend Enterprise before 5.0 7.01.903-1.4 stores specific user-account credentials in a MySQL database, which makes it easier for remote attackers to read the event collection table via requests to the management port, a different vulnerability than CVE-2011-0756.

CVE-2011-0756 trustwave vulnerability CVSS: 5.0 05 May 2011, 02:39 UTC

The application server in Trustwave WebDefend Enterprise before 5.0 uses hardcoded console credentials, which makes it easier for remote attackers to read security-event data by using the remote console GUI to connect to the management port.

CVE-2009-1903 trustwave vulnerability CVSS: 4.3 03 Jun 2009, 17:00 UTC

The PDF XSS protection feature in ModSecurity before 2.5.8 allows remote attackers to cause a denial of service (Apache httpd crash) via a request for a PDF file that does not use the GET method.

CVE-2009-1902 trustwave vulnerability CVSS: 5.0 03 Jun 2009, 17:00 UTC

The multipart processor in ModSecurity before 2.5.9 allows remote attackers to cause a denial of service (crash) via a multipart form datapost request with a missing part header name, which triggers a NULL pointer dereference.