<rss version="2.0"><channel><title>Security on CRS Project</title><link>https://0d2d0d50.website-1u6.pages.dev/categories/security/</link><description>Recent content in CRS Project</description><item><title>CVE-2026-21876: Critical Multipart Charset Bypass Fixed in CRS 4.22.0 and 3.3.8</title><link>https://0d2d0d50.website-1u6.pages.dev/20260106/cve-2026-21876-critical-multipart-charset-bypass-fixed-in-crs-4.22.0-and-3.3.8/</link><pubDate>Tue, 06 Jan 2026 00:00:00 +0000</pubDate><description>&lt;p&gt;We are disclosing a security bypass vulnerability in OWASP CRS that affects rule 922110, which validates charset parameters in multipart/form-data requests. This vulnerability, assigned &lt;strong&gt;CVE-2026-21876&lt;/strong&gt;, has existed since the rule was introduced and affected all CRS supported versions.&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;&lt;/th&gt;
 &lt;th&gt;&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;Published&lt;/td&gt;
 &lt;td&gt;January 6, 2026&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Reported by&lt;/td&gt;
 &lt;td&gt;some0ne (&lt;a href="https://github.com/daytriftnewgen"&gt;https://github.com/daytriftnewgen&lt;/a&gt;)&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Fixed by&lt;/td&gt;
 &lt;td&gt;Ervin Hegedüs (airween) and Felipe Zipitría (fzipi)&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Severity&lt;/td&gt;
 &lt;td&gt;CRITICAL (CVSS 9.3)&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Internal ID&lt;/td&gt;
 &lt;td&gt;9AJ-260102&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The vulnerability allows attackers to bypass charset validation by exploiting how ModSecurity&amp;rsquo;s chained rules process collections. We have developed and tested a fix that is now available in &lt;strong&gt;CRS version 4.22.0&lt;/strong&gt; and &lt;strong&gt;CRS version 3.3.8&lt;/strong&gt;.&lt;/p&gt;</description></item></channel></rss>