Cyber Posture

CVE-2026-21876

CriticalPublic PoC

Published: 08 January 2026

Published
08 January 2026
Modified
09 April 2026
KEV Added
Patch
CVSS Score 9.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
EPSS Score 0.0359 87.9th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-21876 is a critical-severity Incomplete Filtering of Multiple Instances of Special Elements (CWE-794) vulnerability in Owasp Owasp Modsecurity Core Rule Set. Its CVSS base score is 9.3 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 12.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires timely identification, reporting, and patching of flaws like the OWASP CRS rule 922110 bug via upgrades to versions 4.22.0 or 3.3.8.

detect

Enables vulnerability scanning to identify CVE-2026-21876 in deployed WAF rulesets, prompting remediation.

detect

Ensures receipt and dissemination of security advisories like GHSA-36fv-25j3-r2c5 for the CRS multipart processing flaw.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

WAF rule bypass in multipart charset detection directly enables remote exploitation of public-facing web applications without authentication.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 4.22.0 and 3.3.8, the current rule 922110 has a bug when processing multipart requests with multiple…

more

parts. When the first rule in a chain iterates over a collection (like `MULTIPART_PART_HEADERS`), the capture variables (`TX:0`, `TX:1`) get overwritten with each iteration. Only the last captured value is available to the chained rule, which means malicious charsets in earlier parts can be missed if a later part has a legitimate charset. Versions 4.22.0 and 3.3.8 patch the issue.

Deeper analysisAI

CVE-2026-21876 affects the OWASP Core Rule Set (CRS), a collection of generic attack detection rules used with compatible web application firewalls. Prior to versions 4.22.0 and 3.3.8, rule 922110 contains a bug when processing multipart requests with multiple parts. During iteration over collections like MULTIPART_PART_HEADERS, capture variables such as TX:0 and TX:1 are overwritten with each iteration, leaving only the last captured value available to chained rules. This can cause malicious charsets in earlier parts to be missed if a subsequent part contains a legitimate charset.

Remote attackers require no privileges, authentication, or user interaction to exploit this vulnerability over the network with low complexity. By crafting a multipart request with a malicious charset in an early part followed by a legitimate charset in a later part, attackers can bypass detection by rule 922110. The vulnerability has a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N), enabling high confidentiality impact through scope change, such as evading WAF protections for underlying web application attacks, with low integrity impact and no availability impact. It is associated with CWE-794.

Mitigation requires upgrading to OWASP CRS version 4.22.0 or 3.3.8, where the issue is patched via specific commits. The GitHub security advisory GHSA-36fv-25j3-r2c5 and release notes detail the fixes, including commit 80d80473abf71bd49bf6d3c1ab221e3c74e4eb83 for the v4 branch and 9917985de09a6cf38b3261faf9105e909d67a7d6 for v3.

Details

CWE(s)

Affected Products

owasp
owasp modsecurity core rule set
≤ 3.3.8 · 4.0.0 — 4.22.0

CVEs Like This One

CVE-2026-33691Same product: Owasp Owasp Modsecurity Core Rule Set
CVE-2025-66022Same vendor: Owasp

References