EasyApache4 v25.18 Maintenance and Security Release
cPanel, L.L.C. has released an update for EasyApache 4! Take a look at some highlights below, and then join us on the cPanel Community Forums, Discord, or Reddit to talk about this update and much more. If you have additional questions, feel free to reach out on one of our social channels.
- ea-ruby27-rubygem-rack
- EA-12886: Update ea-ruby27-rubygem-rack from v2.2.15 to v2.2.16
- ea-modsec2-rules-owasp-crs
- ZC-12873: Correct issue with WHM Modsecurity UI
- ea-apache24
- ZC-12836: Add dep for remote IP module
- ea-apache24-config
- ZC-12837: Create Cloudflare mod_remoteip configuration
- ea-modsec30-rules-owasp-crs
- ZC-12871: Correct the meta data
- ea-apache24-mod_security2
- ZC-12886: Update ea-apache24-mod_security2 from v2.9.8 to v2.9.10
- Possible DoS vulnerability: CVE-2025-47947
- DoS vulnerability: CVE-2025-48866
- ZC-12886: Update ea-apache24-mod_security2 from v2.9.8 to v2.9.10
- ea-libcurl
- EA-12899: Update ea-libcurl from v8.12.1 to v8.14.0
- CVE-2025-5025: No QUIC certificate pinning with wolfSSL
- CVE-2025-4947: QUIC certificate check skip with wolfSSL
- EA-12899: Update ea-libcurl from v8.12.1 to v8.14.0
- ea-freetds
- EA-12900: Update ea-freetds from v1.5.1 to v1.5.2
SUMMARY
WebPros International, LLC has updated packages for EasyApache 4 with a updated versions of ModSecurity 2 and libcurl. This release addresses vulnerabilities related to CVE-2025-47947, CVE-2025-48866, CVE-2025-5025, and CVE-2025-4947. We strongly encourage all ModSecurity 2 users update to version 2.9.10 and all libcurl users to update to version 8.14.0.
AFFECTED VERSIONS
All versions of ModSecurity 2 through 2.9.9.
All versions of libcurl through 8.13.0.
SECURITY RATING
The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:
CVE-2025-47947 – HIGH
ModSecurity 2.9.10
Fixed vulnerability related to CVE-2025-47947.
CVE-2025-48866 – HIGH
ModSecurity 2.9.10
Fixed vulnerability related to CVE-2025-48866.
CVE-2025-5025 – MEDIUM
libcurl 8.14.0
Fixed vulnerability related to CVE-2025-5025.
CVE-2025-4947 – MEDIUM
libcurl 8.14.0
Fixed vulnerability related to CVE-2025-4947.
SOLUTION
WebPros International, LLC has released updated packages for EasyApache 4 25.16 on 2025 June 4, with ModSecurity 2 version 2.9.10 and libcurl version 8.14.0. Unless you have enabled automatic package updates in your cron, update your system with either your package manager or WHM’s Run System Update interface.
REFERENCES
https://www.cve.org/CVERecord?id=CVE-2025-47947
https://www.cve.org/CVERecord?id=CVE-2025-48866
https://www.cve.org/CVERecord?id=CVE-2025-5025
https://www.cve.org/CVERecord?id=CVE-2025-4947
https://curl.se/ch/8.14.0.html
https://github.com/owasp-modsecurity/ModSecurity/releases
Information about all releases this year can be found in the 2025 EasyApache 4 Changelog.
You can follow our RSS feed for all our releases here: https://docs.cpanel.net/release-notes/release-notes/index.xml
GPG signed copy of this announcement: https://news.cpanel.com/wp-content/uploads/2025/06/EA4-25.18-CVE.signed.txt
-
I've got a Cloudlinux 9 machine with cPanel that has updated to ea-apache24-mod_security2-2.9.10-1.3.1.cpanel.x86_64 yesterday (Wed Jun 4)
I've got three Cloudlinux 8 machines with cPanel that have not updated mod_security2 and are still on ea-apache24-mod_security2-2:2.9.8-1.el8.cloudlinux.x86_64
Oddly the CL9 box has a "cpanel" package and the CL8 boxes have "cloudlinux" packages, even though all machines are CL machines with the only differentiation being that the one that received an update was a CL9 box.
Shouldn't the EasyApache update been applied to all servers already, regarldess of whether they are Cloudlinux boxes or simple Almalinux boxes?
0 -
Not necessarily - if the package is coming specifically from the CloudLinux mirrors they would need to get that applied first.
I also forgot to lock this thread as this area should be strictly for announcements, so I'm doing that now.
0
Post is closed for comments.
Comments
2 comments