-
Notifications
You must be signed in to change notification settings - Fork 568
Open
Labels
Description
What happened?
I have configured AppSec with crowdsecurity/appsec-crs to have ModSecurity rules applied (migration from NGINX + ModSec). It seems that custom ModSec rules are not applied.
What did you expect to happen?
Whitelist false positive alerts from ModSec Collection
How can we reproduce it (as minimally and precisely as possible)?
I tried to add this rules as a test:
appsec:
rules:
modsec.yaml: |
name: custom/modsec
description: "Custom ModSecurity rules"
debug: true
seclang_rules:
- SecRule REQUEST_HEADERS:User-Agent "@contains grpc-go" "id:10011001,phase:2,pass,log,msg:'TEST APPSEC RULE HIT'"
I want to trigger the test via this commande line:
curl -k -X POST <URL> -H "User-Agent: grpc-go/1.75.1" -H "Content-Type: application/grpc"
I should see TEST APPSEC RULE HIT but in the logs, request is blocked:
time="2026-01-05T10:02:16Z" level=info msg="WAF out-of-band match: anomaly score out-of-band: anomaly: 8, from <IP> (172.16.0.21)"
Anything else we need to know?
No response
Crowdsec version
Details
$ cscli version
crowdsec-appsec-5cf5dd7987-9zh6g:/# cscli version
version: v1.7.4-db3efdbf
Codename: alphaga
BuildDate: 2025-12-09_09:08:11
GoVersion: 1.25.5
Platform: docker
libre2: C++
User-Agent: crowdsec/v1.7.4-db3efdbf-docker
Constraint_parser: >= 1.0, <= 3.0
Constraint_scenario: >= 1.0, <= 3.0
Constraint_api: v1
Constraint_acquis: >= 1.0, < 2.0
Built-in optional components: cscli_setup, datasource_appsec, datasource_cloudwatch, datasource_docker, datasource_file, datasource_http, datasource_journalctl, datasource_k8s-audit, datasource_kafka, datasource_kinesis, datasource_loki, datasource_s3, datasource_syslog, datasource_victorialogs, datasource_wineventlog, db_mysql, db_postgres, db_sqliteOS version
Installed via Helm chart
Enabled collections and parsers
Details
crowdsec-appsec-5cf5dd7987-9zh6g:/# cscli hub list -o raw
Loaded: 157 parsers, 11 postoverflows, 771 scenarios, 9 contexts, 5 appsec-configs, 164 appsec-rules, 157 collections
Unmanaged items: 1 local, 0 tainted
name,status,version,description,type
crowdsecurity/appsec-logs,enabled,0.5,Parse Appsec events,parsers
crowdsecurity/cri-logs,enabled,0.1,CRI logging format parser,parsers
crowdsecurity/dateparse-enrich,enabled,0.2,,parsers
crowdsecurity/docker-logs,enabled,0.1,docker json logs parser,parsers
crowdsecurity/geoip-enrich,enabled,0.5,"Populate event with geoloc info : as, country, coords, source range.",parsers
crowdsecurity/public-dns-allowlist,enabled,0.1,Allow events from public DNS servers,parsers
crowdsecurity/sshd-logs,enabled,3.1,Parse openSSH logs,parsers
crowdsecurity/syslog-logs,enabled,1.0,,parsers
crowdsecurity/whitelists,enabled,0.3,Whitelist events from private ipv4 addresses,parsers
crowdsecurity/cdn-whitelist,enabled,0.4,Whitelist CDN providers,postoverflows
crowdsecurity/rdns,enabled,0.3,Lookup the DNS associated to the source IP only for overflows,postoverflows
crowdsecurity/seo-bots-whitelist,enabled,0.5,Whitelist good search engine crawlers,postoverflows
crowdsecurity/appsec-generic-test,enabled,0.2,Crowdsec Generic Test Scenario for AppSec: generate an alert for appsec out of band rule for testing,scenarios
crowdsecurity/appsec-native,enabled,0.2,Identify attacks flagged by CrowdSec AppSec via native rules,scenarios
crowdsecurity/appsec-vpatch,enabled,0.6,Identify attacks flagged by CrowdSec AppSec,scenarios
crowdsecurity/crowdsec-appsec-outofband,enabled,0.7,IP has made more than 5 requests that triggered out-of-band appsec rules,scenarios
crowdsecurity/ssh-bf,enabled,0.3,Detect ssh bruteforce,scenarios
crowdsecurity/ssh-cve-2024-6387,enabled,0.2,Detect exploitation attempt of CVE-2024-6387,scenarios
crowdsecurity/ssh-generic-test,enabled,0.2,Crowdsec Generic Test Scenario: SSH brute force trigger,scenarios
crowdsecurity/ssh-refused-conn,enabled,0.1,Detect sshd refused connections,scenarios
crowdsecurity/ssh-slow-bf,enabled,0.4,Detect slow ssh bruteforce,scenarios
crowdsecurity/appsec_base,enabled,1.1,,contexts
crowdsecurity/bf_base,enabled,0.1,,contexts
crowdsecurity/appsec-default,enabled,0.4,,appsec-configs
crowdsecurity/crs,enabled,0.3,,appsec-configs
crowdsecurity/generic-rules,enabled,0.4,,appsec-configs
crowdsecurity/virtual-patching,enabled,0.4,,appsec-configs
crowdsecurity/appsec-generic-test,enabled,0.3,AppSec Generic Test: trigger on GET /crowdsec-test-NtktlJHV4TfBSK3wvlhiOBnl`,appsec-rules
crowdsecurity/base-config,enabled,0.1,,appsec-rules
crowdsecurity/crs,enabled,0.5,,appsec-rules
crowdsecurity/experimental-no-user-agent,enabled,0.1,Protect against no user agent,appsec-rules
crowdsecurity/generic-freemarker-ssti,enabled,0.3,Generic FreeMarker SSTI,appsec-rules
crowdsecurity/generic-wordpress-uploads-listing,enabled,0.2,Protect Wordpress uploads directory from listing files,appsec-rules
crowdsecurity/generic-wordpress-uploads-php,enabled,0.1,Detect php execution in wordpress uploads directory,appsec-rules
crowdsecurity/vpatch-connectwise-auth-bypass,enabled,0.3,Detect exploitation of auth bypass in ConnectWise ScreenConnect,appsec-rules
crowdsecurity/vpatch-CVE-2002-1131,enabled,0.1,"Detects XSS attempts in SquirrelMail 1.2.6/1.2.7 via unsanitized input in addressbook, options, search, and help modules.",appsec-rules
crowdsecurity/vpatch-CVE-2007-0885,enabled,0.1,Detects XSS vulnerability in Jira Rainbow.Zen via the id parameter in BrowseProject.jspa.,appsec-rules
crowdsecurity/vpatch-CVE-2017-9841,enabled,0.3,PHPUnit RCE (CVE-2017-9841),appsec-rules
crowdsecurity/vpatch-CVE-2018-1000861,enabled,0.1,Jenkins - RCE (CVE-2018-1000861),appsec-rules
crowdsecurity/vpatch-CVE-2018-10562,enabled,0.2,Dasan GPON RCE (CVE-2018-10562),appsec-rules
crowdsecurity/vpatch-CVE-2018-11511,enabled,0.1,Detects SQL injection attempts in ASUSTOR ADM via album_id parameter in /photo-gallery/api/album/tree_lists/.,appsec-rules
crowdsecurity/vpatch-CVE-2018-1207,enabled,0.1,Detects remote code injection in Dell iDRAC7/8 devices via LD_DEBUG CGI variable.,appsec-rules
crowdsecurity/vpatch-CVE-2018-13379,enabled,0.2,Fortinet FortiOS - Credentials Disclosure (CVE-2018-13379),appsec-rules
crowdsecurity/vpatch-CVE-2018-20062,enabled,0.1,ThinkPHP - RCE (CVE-2018-20062),appsec-rules
crowdsecurity/vpatch-CVE-2019-1003030,enabled,0.1,Jenkins - RCE (CVE-2019-1003030),appsec-rules
crowdsecurity/vpatch-CVE-2019-12989,enabled,0.3,Citrix SQLi (CVE-2019-12989),appsec-rules
crowdsecurity/vpatch-CVE-2019-18935,enabled,0.1,Telerik - RCE (CVE-2019-18935),appsec-rules
crowdsecurity/vpatch-CVE-2019-18952,enabled,0.1,Detects arbitrary file upload attempts to Xfilesharing up.cgi endpoint (CVE-2019-18952),appsec-rules
crowdsecurity/vpatch-CVE-2019-5418,enabled,0.1,Detects Rails file content disclosure via crafted Accept header (CVE-2019-5418),appsec-rules
crowdsecurity/vpatch-CVE-2019-7276,enabled,0.1,Detects unauthenticated remote code execution in Optergy Proton/Enterprise via backdoor console endpoint.,appsec-rules
crowdsecurity/vpatch-CVE-2020-10987,enabled,0.1,Detects command injection in Tenda AC15 AC1900 via deviceName parameter in setUsbUnload endpoint.,appsec-rules
crowdsecurity/vpatch-CVE-2020-11738,enabled,0.6,Wordpress Snap Creek Duplicator - Path Traversal (CVE-2020-11738),appsec-rules
crowdsecurity/vpatch-CVE-2020-13640,enabled,0.1,Detects SQL injection in wpDiscuz plugin via the order parameter in wpdLoadMoreComments action.,appsec-rules
crowdsecurity/vpatch-CVE-2020-17496,enabled,0.1,vBulletin RCE (CVE-2020-17496),appsec-rules
crowdsecurity/vpatch-CVE-2020-25078,enabled,0.1,Detects unauthorized access to D-Link camera administrator password disclosure endpoint.,appsec-rules
crowdsecurity/vpatch-CVE-2020-5902,enabled,0.1,F5 BIG-IP TMUI - RCE (CVE-2020-5902),appsec-rules
crowdsecurity/vpatch-CVE-2020-8656,enabled,0.1,Detects SQL injection in EyesOfNetwork getApiKey endpoint via username parameter.,appsec-rules
crowdsecurity/vpatch-CVE-2020-9054,enabled,0.1,Detects pre-authentication command injection in Zyxel NAS devices via weblogin.cgi,appsec-rules
crowdsecurity/vpatch-CVE-2021-22941,enabled,0.3,Citrix RCE (CVE-2021-22941),appsec-rules
crowdsecurity/vpatch-CVE-2021-26072,enabled,0.1,Detects SSRF in Atlassian Confluence via WidgetConnector plugin (CVE-2021-26072),appsec-rules
crowdsecurity/vpatch-CVE-2021-26086,enabled,0.1,Atlassian Jira Server/Data Center 8.4.0 - Limited Remote File Read/Include (CVE-2021-26086),appsec-rules
crowdsecurity/vpatch-CVE-2021-26294,enabled,0.1,Detects unauthorized access to AfterLogic Aurora/WebMail Pro WebDAV endpoint using default caldav_public_user credentials and path traversal.,appsec-rules
crowdsecurity/vpatch-CVE-2021-3129,enabled,0.4,Laravel with Ignition Debug Mode RCE (CVE-2021-3129),appsec-rules
crowdsecurity/vpatch-CVE-2021-32478,enabled,0.1,Detects reflected XSS and open redirect in Moodle LTI authorization endpoint via unsanitized redirect_uri parameter.,appsec-rules
crowdsecurity/vpatch-CVE-2021-43798,enabled,0.4,Grafana - Arbitrary File Read (CVE-2021-43798),appsec-rules
crowdsecurity/vpatch-CVE-2021-44529,enabled,0.2,Detects code injection in Ivanti EPM CSA via cookie manipulation (CVE-2021-44529),appsec-rules
crowdsecurity/vpatch-CVE-2022-1388,enabled,0.1,Detects F5 BIG-IP iControl REST authentication bypass and RCE via crafted POST to /mgmt/tm/util/bash with X-F5-Auth-Token header.,appsec-rules
crowdsecurity/vpatch-CVE-2022-22954,enabled,0.2,VMWare Workspace ONE Access RCE (CVE-2022-22954),appsec-rules
crowdsecurity/vpatch-CVE-2022-22965,enabled,0.2,Spring4Shell - RCE (CVE-2022-22965),appsec-rules
crowdsecurity/vpatch-CVE-2022-24086,enabled,0.1,Detects RCE in Adobe Commerce (Magento) via crafted JSON in checkout process (CVE-2022-24086),appsec-rules
crowdsecurity/vpatch-CVE-2022-25322,enabled,0.1,Detects SQL injection attempts in ZEROF Web Server 2.0 via /HandleEvent endpoint.,appsec-rules
crowdsecurity/vpatch-CVE-2022-25488,enabled,0.4,Atom CMS - SQLi (CVE-2022-25488),appsec-rules
crowdsecurity/vpatch-CVE-2022-26134,enabled,0.2,Confluence - RCE (CVE-2022-26134),appsec-rules
crowdsecurity/vpatch-CVE-2022-27926,enabled,0.4,Zimbra Collaboration XSS (CVE-2022-27926),appsec-rules
crowdsecurity/vpatch-CVE-2022-31499,enabled,0.1,Detects remote command injection in Nortek Linear eMerge E3-Series via ReaderNo parameter.,appsec-rules
crowdsecurity/vpatch-CVE-2022-35914,enabled,0.5,GLPI RCE (CVE-2022-35914),appsec-rules
crowdsecurity/vpatch-CVE-2022-38627,enabled,0.1,Detects SQL injection vulnerability in Linear eMerge E3-Series via idt parameter,appsec-rules
crowdsecurity/vpatch-CVE-2022-41082,enabled,0.1,Microsoft Exchange - RCE (CVE-2022-41082),appsec-rules
crowdsecurity/vpatch-CVE-2022-44877,enabled,0.2,CentOS Web Panel 7 RCE (CVE-2022-44877),appsec-rules
crowdsecurity/vpatch-CVE-2022-46169,enabled,0.5,Cacti RCE (CVE-2022-46169),appsec-rules
crowdsecurity/vpatch-CVE-2023-0297,enabled,0.1,"Detects pre-auth remote code execution in PyLoad via code injection in the ""jk"" parameter of /flash/addcrypted2.",appsec-rules
crowdsecurity/vpatch-CVE-2023-1389,enabled,0.1,TP-Link Archer AX21 - RCE (CVE-2023-1389),appsec-rules
crowdsecurity/vpatch-CVE-2023-20198,enabled,0.6,CISCO IOS XE Account Creation (CVE-2023-20198),appsec-rules
crowdsecurity/vpatch-CVE-2023-22515,enabled,0.4,Atlassian Confluence Privesc (CVE-2023-22515),appsec-rules
crowdsecurity/vpatch-CVE-2023-22527,enabled,0.2,RCE using SSTI in Confluence (CVE-2023-22527),appsec-rules
crowdsecurity/vpatch-CVE-2023-23063,enabled,0.1,Detects local file disclosure in Cellinx NVT Web Server via GetFileContent.cgi PATH parameter.,appsec-rules
crowdsecurity/vpatch-CVE-2023-23752,enabled,0.1,Joomla! Webservice - Password Disclosure (CVE-2023-23752),appsec-rules
crowdsecurity/vpatch-CVE-2023-24489,enabled,0.2,Citrix ShareFile RCE (CVE-2023-24489),appsec-rules
crowdsecurity/vpatch-CVE-2023-28121,enabled,0.1,WooCommerce auth bypass (CVE-2023-28121),appsec-rules
crowdsecurity/vpatch-CVE-2023-3169,enabled,0.1,Detects unauthenticated stored XSS in tagDiv Composer via compiled_css parameter in /wp-json/tdw/save_css,appsec-rules
crowdsecurity/vpatch-CVE-2023-33617,enabled,0.4,Atlassian Confluence Privesc (CVE-2023-33617),appsec-rules
crowdsecurity/vpatch-CVE-2023-34362,enabled,0.6,MOVEit Transfer RCE (CVE-2023-34362),appsec-rules
crowdsecurity/vpatch-CVE-2023-35078,enabled,0.1,MobileIron Core Remote Unauthenticated API Access (CVE-2023-35078),appsec-rules
crowdsecurity/vpatch-CVE-2023-35082,enabled,0.2,MobileIron Core Remote Unauthenticated API Access (CVE-2023-35082),appsec-rules
crowdsecurity/vpatch-CVE-2023-3519,enabled,0.3,Citrix RCE (CVE-2023-3519),appsec-rules
crowdsecurity/vpatch-CVE-2023-38205,enabled,0.3,Adobe ColdFusion Access Control Bypass (CVE-2023-38205),appsec-rules
crowdsecurity/vpatch-CVE-2023-40044,enabled,0.3,WS_FTP .NET deserialize RCE (CVE-2023-40044),appsec-rules
crowdsecurity/vpatch-CVE-2023-42793,enabled,0.3,JetBrains Teamcity Auth Bypass (CVE-2023-42793),appsec-rules
crowdsecurity/vpatch-CVE-2023-46805,enabled,0.4,Ivanti Connect Auth Bypass (CVE-2023-46805),appsec-rules
crowdsecurity/vpatch-CVE-2023-47218,enabled,0.2,QNAP QTS - RCE (CVE-2023-47218),appsec-rules
crowdsecurity/vpatch-CVE-2023-49070,enabled,0.1,Apache OFBiz - RCE (CVE-2023-49070),appsec-rules
crowdsecurity/vpatch-CVE-2023-50164,enabled,0.6,Apache Struts2 Path Traversal (CVE-2023-50164),appsec-rules
crowdsecurity/vpatch-CVE-2023-6000,enabled,0.1,Detects unauthenticated stored XSS in WordPress Popup Builder plugin via sgpb-WillOpen parameter.,appsec-rules
crowdsecurity/vpatch-CVE-2023-6553,enabled,0.1,Backup Migration plugin for WordPress RCE (CVE-2023-6553),appsec-rules
crowdsecurity/vpatch-CVE-2023-7028,enabled,0.2,Gitlab Password Reset Account Takeover (CVE-2023-7028),appsec-rules
crowdsecurity/vpatch-CVE-2024-0012,enabled,0.1,PanOS - Authentication Bypass (CVE-2024-0012),appsec-rules
crowdsecurity/vpatch-CVE-2024-0204,enabled,0.1,Detects authentication bypass in Fortra GoAnywhere MFT via path traversal to InitialAccountSetup.xhtml,appsec-rules
crowdsecurity/vpatch-CVE-2024-1212,enabled,0.3,Progress Kemp LoadMaster Unauthenticated Command Injection (CVE-2024-1212),appsec-rules
crowdsecurity/vpatch-CVE-2024-22024,enabled,0.1,Ivanti Connect Secure - XXE (CVE-2024-22024),appsec-rules
crowdsecurity/vpatch-CVE-2024-23897,enabled,0.4,Jenkins CLI RCE (CVE-2024-23897),appsec-rules
crowdsecurity/vpatch-CVE-2024-27198,enabled,0.5,Teamcity - Authentication Bypass (CVE-2024-27198),appsec-rules
crowdsecurity/vpatch-CVE-2024-27292,enabled,0.2,Local File Inclusion - Docassemble,appsec-rules
crowdsecurity/vpatch-CVE-2024-27348,enabled,0.1,Apache HugeGraph-Server - RCE (CVE-2024-27348),appsec-rules
crowdsecurity/vpatch-CVE-2024-27564,enabled,0.3,Detects SSRF attack via pictureproxy.php in ChatGPT application,appsec-rules
crowdsecurity/vpatch-CVE-2024-27954,enabled,0.1,WP Automatic - Path Traversal (CVE-2024-27954),appsec-rules
crowdsecurity/vpatch-CVE-2024-27956,enabled,0.1,WordPress Automatic Plugin - SQLi (CVE-2024-27956),appsec-rules
crowdsecurity/vpatch-CVE-2024-28255,enabled,0.1,OpenMetadata - Authentication Bypass (CVE-2024-28255),appsec-rules
crowdsecurity/vpatch-CVE-2024-28987,enabled,0.1,SolarWinds WHD Hardcoded Credentials (CVE-2024-28987),appsec-rules
crowdsecurity/vpatch-CVE-2024-29028,enabled,0.1,Detects SSRF vulnerability in Memos API /o/get/httpmeta endpoint via url parameter.,appsec-rules
crowdsecurity/vpatch-CVE-2024-29824,enabled,0.1,Ivanti EPM - SQLi (CVE-2024-29824),appsec-rules
crowdsecurity/vpatch-CVE-2024-29849,enabled,0.5,Veeam Backup Enterprise Manager - Authentication Bypass (CVE-2024-29849),appsec-rules
crowdsecurity/vpatch-CVE-2024-29973,enabled,0.1,Zyxel - RCE (CVE-2024-29973),appsec-rules
crowdsecurity/vpatch-CVE-2024-32113,enabled,0.1,Apache OFBiz - Path Traversal (CVE-2024-32113),appsec-rules
crowdsecurity/vpatch-CVE-2024-3272,enabled,0.1,D-Link NAS - RCE (CVE-2024-3272),appsec-rules
crowdsecurity/vpatch-CVE-2024-3273,enabled,0.1,D-LINK NAS Command Injection (CVE-2024-3273),appsec-rules
crowdsecurity/vpatch-CVE-2024-32870,enabled,0.1,Detects unauthorized access to iTop Hub Connector information disclosure endpoint.,appsec-rules
crowdsecurity/vpatch-CVE-2024-34102,enabled,0.1,Adobe Commerce & Magento - XXE (CVE-2024-34102),appsec-rules
crowdsecurity/vpatch-CVE-2024-38816,enabled,0.2,Spring - Path Traversal (CVE-2024-38816),appsec-rules
crowdsecurity/vpatch-CVE-2024-38856,enabled,0.1,Apache OFBiz Incorrect Authorization (CVE-2024-38856),appsec-rules
crowdsecurity/vpatch-CVE-2024-41713,enabled,0.2,Mitel MiCollab - Path Traversal (CVE-2024-41713),appsec-rules
crowdsecurity/vpatch-CVE-2024-4577,enabled,0.1,PHP CGI Command Injection - CVE-2024-4577,appsec-rules
crowdsecurity/vpatch-CVE-2024-46506,enabled,0.1,Detects unauthenticated command injection in NetAlertX via function=savesettings in util.php,appsec-rules
crowdsecurity/vpatch-CVE-2024-51378,enabled,0.1,Cyberpanel - RCE (CVE-2024-51378),appsec-rules
crowdsecurity/vpatch-CVE-2024-51567,enabled,0.1,CyberPanel RCE (CVE-2024-51567),appsec-rules
crowdsecurity/vpatch-CVE-2024-51977,enabled,0.1,Detects unauthenticated access to sensitive information disclosure endpoint /etc/mnt_info.csv on Brother MFC-L9570CDW devices.,appsec-rules
crowdsecurity/vpatch-CVE-2024-52301,enabled,0.1,Laravel - Parameter Injection (CVE-2024-52301),appsec-rules
crowdsecurity/vpatch-CVE-2024-57727,enabled,0.4,Detects unauthenticated path traversal attempts targeting SimpleHelp <= 5.5.7,appsec-rules
crowdsecurity/vpatch-CVE-2024-6205,enabled,0.2,PayPlus Payment Gateway WordPress plugin - SQL Injection (CVE-2024-6205),appsec-rules
crowdsecurity/vpatch-CVE-2024-6235,enabled,0.1,Detects unauthorized access to sensitive NetScaler Console configuration endpoint disclosing ADM_SESSIONID.,appsec-rules
crowdsecurity/vpatch-CVE-2024-7593,enabled,0.1,Ivanti vTM - Authentication Bypass (CVE-2024-7593),appsec-rules
crowdsecurity/vpatch-CVE-2024-8190,enabled,0.1,Ivanti Cloud Services Appliance - RCE (CVE-2024-8190),appsec-rules
crowdsecurity/vpatch-CVE-2024-8963,enabled,0.2,Ivanti CSA - Path Traversal (CVE-2024-8963),appsec-rules
crowdsecurity/vpatch-CVE-2024-9465,enabled,0.2,Palo Alto Expedition - SQL Injection (CVE-2024-9465),appsec-rules
crowdsecurity/vpatch-CVE-2024-9474,enabled,0.3,PanOS - Privilege Escalation (CVE-2024-9474),appsec-rules
crowdsecurity/vpatch-CVE-2025-24893,enabled,0.2,Detects arbitrary remote code execution vulnerability in XWiki via SolrSearch.,appsec-rules
crowdsecurity/vpatch-CVE-2025-25257,enabled,0.1,Fortinet FortiWeb Fabric Connector - Pre-Authenticated SQL Injection (CVE-2025-25257),appsec-rules
crowdsecurity/vpatch-CVE-2025-2611,enabled,0.1,Detects command injection in ICTBroadcast via BROADCAST cookie,appsec-rules
crowdsecurity/vpatch-CVE-2025-27222,enabled,0.1,Detects path traversal in TRUfusion Enterprise via cobrandingImageName parameter in getCobrandingData endpoint.,appsec-rules
crowdsecurity/vpatch-CVE-2025-27223,enabled,0.1,Detects authentication bypass via hard-coded cryptographic key in TRUfusion Enterprise,appsec-rules
crowdsecurity/vpatch-CVE-2025-28367,enabled,0.1,Detects directory traversal in mojoPortal BetterImageGallery API Controller (CVE-2025-28367),appsec-rules
crowdsecurity/vpatch-CVE-2025-29306,enabled,0.1,Detects FoxCMS v1.2.5 RCE via malicious id parameter in /images/index.html,appsec-rules
crowdsecurity/vpatch-CVE-2025-29927,enabled,0.2,Next.js Middleware Bypass - (CVE-2025-29927),appsec-rules
crowdsecurity/vpatch-CVE-2025-31161,enabled,0.1,Detects authentication bypass in CrushFTP via crafted Authorization header and specific endpoint access.,appsec-rules
crowdsecurity/vpatch-CVE-2025-31324,enabled,0.1,SAP NetWeaver - File Upload (CVE-2025-31324),appsec-rules
crowdsecurity/vpatch-CVE-2025-3248,enabled,0.1,Detects unauthenticated remote code execution in Langflow via /api/v1/validate/code endpoint.,appsec-rules
crowdsecurity/vpatch-CVE-2025-3605,enabled,0.1,Detects privilege escalation in WordPress Frontend Login and Registration Blocks plugin via unauthorized email update.,appsec-rules
crowdsecurity/vpatch-CVE-2025-36604,enabled,0.1,Detects OS command injection in Dell UnityVSA via crafted path in /misc/ endpoint (CVE-2025-36604),appsec-rules
crowdsecurity/vpatch-CVE-2025-47812,enabled,0.1,Detects Wing FTP Server <= 7.4.3 RCE via Lua code injection in username parameter during login.,appsec-rules
crowdsecurity/vpatch-CVE-2025-49113,enabled,0.1,Detects arbitrary remote code execution vulnerability via PHP Object Deserialization in Roundcube,appsec-rules
crowdsecurity/vpatch-CVE-2025-49132,enabled,0.1,Detects unauthenticated remote code execution in Pterodactyl Panel via path traversal in /locales/locale.json,appsec-rules
crowdsecurity/vpatch-CVE-2025-52488,enabled,0.2,Detects Unicode path normalization NTLM hash disclosure in DNN (DotNetNuke) via crafted file upload filename.,appsec-rules
crowdsecurity/vpatch-CVE-2025-54249,enabled,0.1,Detects SSRF in Adobe Experience Manager via /services/accesstoken/verify endpoint with crafted auth_url parameter.,appsec-rules
crowdsecurity/vpatch-CVE-2025-55182,enabled,0.2,Detects React RCE via crafted form action parameters exploiting server action handlers,appsec-rules
crowdsecurity/vpatch-CVE-2025-55748,enabled,0.1,Detects path traversal in XWiki Platform via resource parameter in ssx and jsx endpoints.,appsec-rules
crowdsecurity/vpatch-CVE-2025-57819,enabled,0.1,Detects unauthenticated SQL injection and RCE in FreePBX via vulnerable brand parameter in ajax.php endpoint.,appsec-rules
crowdsecurity/vpatch-CVE-2025-61882,enabled,0.1,Detects Oracle E-Business Suite 12.2.3–12.2.14 LFI and SSRF/RCE via ieshostedsurvey.jsp and UiServlet endpoints.,appsec-rules
crowdsecurity/vpatch-CVE-2025-64446,enabled,0.1,Detects FortiWeb authentication bypass via path traversal and CGIINFO header with admin impersonation,appsec-rules
crowdsecurity/vpatch-env-access,enabled,0.2,Detect access to .env files,appsec-rules
crowdsecurity/vpatch-git-config,enabled,0.4,Detect access to .git files,appsec-rules
crowdsecurity/vpatch-laravel-debug-mode,enabled,0.3,Detect bots exploiting laravel debug mode,appsec-rules
crowdsecurity/vpatch-symfony-profiler,enabled,0.1,Detect abuse of symfony profiler,appsec-rules
custom/modsec,"enabled,local",,,appsec-rules
crowdsecurity/appsec-crs,enabled,0.7,WAF: Non-Blocking OWASP Core Rule Set,collections
crowdsecurity/appsec-generic-rules,enabled,1.0,A collection of generic attack vectors for additional protection.,collections
crowdsecurity/appsec-virtual-patching,enabled,11.1,"a generic virtual patching collection, suitable for most web servers.",collections
crowdsecurity/linux,enabled,0.3,core linux support : syslog+geoip+ssh,collections
crowdsecurity/sshd,enabled,0.7,sshd support : parser and brute-force detection,collections
crowdsecurity/whitelist-good-actors,enabled,0.2,Good actors whitelists,collectionsAcquisition config
Details
```console # On Linux: $ cat /etc/crowdsec/acquis.yaml /etc/crowdsec/acquis.d/* # paste output hereOn Windows:
C:> Get-Content C:\ProgramData\CrowdSec\config\acquis.yaml
paste output here
Config show
Details
$ cscli config show
# paste output herePrometheus metrics
Details
$ cscli metrics
# paste output here