Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Coreruleset
Coreruleset coreruleset |
|
| Vendors & Products |
Coreruleset
Coreruleset coreruleset |
|
| References |
| |
| Metrics |
ssvc
|
Thu, 02 Apr 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 3.3.9 and 4.25.0, a bypass was identified in OWASP CRS that allows uploading files with dangerous extensions (.php, .phar, .jsp, .jspx) by inserting whitespace padding in the filename (e.g. photo. php or shell.jsp ). The affected rules do not normalize whitespace before evaluating the file extension regex, so the dot-extension check fails to match. This issue has been patched in versions 3.3.9 and 4.25.0. | |
| Title | OWASP CRS: Whitespace padding in filenames bypasses file upload extension checks | |
| Weaknesses | CWE-178 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-02T17:38:10.247Z
Reserved: 2026-03-23T16:34:59.932Z
Link: CVE-2026-33691
Updated: 2026-04-02T15:25:25.719Z
Status : Received
Published: 2026-04-02T16:16:22.593
Modified: 2026-04-02T16:16:22.593
Link: CVE-2026-33691
No data.
OpenCVE Enrichment
Updated: 2026-04-02T20:20:12Z