<rss version="2.0"><channel><title>Security on CRS Project</title><link>https://31d2f1a5.website-1u6.pages.dev/categories/security/</link><description>Recent content in CRS Project</description><item><title>CVE-2026-21876: Critical Multipart Charset Bypass Fixed in CRS 4.22.0 and 3.3.8</title><link>https://31d2f1a5.website-1u6.pages.dev/20260106/cve-2026-21876-critical-multipart-charset-bypass-fixed-in-crs-4.22.0-and-3.3.8/</link><pubDate>Tue, 06 Jan 2026 00:00:00 +0000</pubDate><description>&lt;p>We are disclosing a security bypass vulnerability in OWASP CRS that affects rule 922110, which validates charset parameters in multipart/form-data requests. This vulnerability, assigned &lt;strong>CVE-2026-21876&lt;/strong>, has existed since the rule was introduced and affected all CRS supported versions.&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>&lt;/th>
 &lt;th>&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>Published&lt;/td>
 &lt;td>January 6, 2026&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Reported by&lt;/td>
 &lt;td>some0ne (&lt;a href="https://github.com/daytriftnewgen">https://github.com/daytriftnewgen&lt;/a>)&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Fixed by&lt;/td>
 &lt;td>Ervin Hegedüs (airween) and Felipe Zipitría (fzipi)&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Severity&lt;/td>
 &lt;td>CRITICAL (CVSS 9.3)&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Internal ID&lt;/td>
 &lt;td>9AJ-260102&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;p>The vulnerability allows attackers to bypass charset validation by exploiting how ModSecurity&amp;rsquo;s chained rules process collections. We have developed and tested a fix that is now available in &lt;strong>CRS version 4.22.0&lt;/strong> and &lt;strong>CRS version 3.3.8&lt;/strong>.&lt;/p></description></item></channel></rss>