Security 10948 Published by

The OWASP Core Rule Set version 4.26.0 strengthens web application firewalls by adding detection signatures for modern attack tools like WhatWAF and ghauri while expanding checks across all HTTP headers. It introduces new rules to catch Server-Side Template Injection attacks and blocks requests targeting sensitive system files that often leak through misconfigured servers. The update also tackles persistent false positives by refining MongoDB operator matching, removing outdated HTTP/0.9 compatibility, and fixing conflicts with common parameter names. Web administrators should deploy the updated rules in detection mode first to verify traffic patterns before switching to active blocking.



How OWASP CRS 4.26.0 Cuts Down False Positives and Blocks Modern Scanners

The latest update to the OWASP Core Rule Set brings sharper detection for automated attack tools while quietly fixing a bunch of annoying false positives that have been tripping up web servers. This release tightens HTTP header validation, adds fresh scanner signatures like WhatWAF and ghauri, and finally addresses template injection flaws that slip through older rule sets. Web administrators running ModSecurity or similar WAF engines will want to review the changes before pushing updates into production environments.

How OWASP CRS 4.26.0 Blocks Modern Attack Tools

The new scanner detection rules now explicitly flag WhatWAF and ghauri alongside a refreshed list of user agent strings. These tools have been gaining traction among penetration testers and malicious actors alike, so blocking them at the edge makes sense. Rule 933100 also expands to inspect every HTTP header instead of just the usual suspects. Headers often carry encoded payloads or manipulation attempts that older rule sets ignore, so checking all of them closes a quiet backdoor for attackers who prefer stealth over brute force.

Catching Sensitive File Leaks and Template Injection Attacks

The expanded operating system file list now catches requests targeting .dockerenv, .DS_Store, META-INF/, and WEB-INF/. These files usually sit outside public directories but get exposed when misconfigured servers or path traversal bugs leak them. Adding a required path prefix for .profile requests also stops lazy scanning scripts from wasting server resources on obvious probes. Rule 934200 introduces detection for Server-Side Template Injection, which has become a favorite vector for remote code execution in modern web frameworks. Catching SSTI early prevents attackers from injecting malicious logic directly into rendered templates.

Smoothing Out the Rough Edges That Break Legitimate Traffic

False positives have always been the biggest headache when running a strict web application firewall, and this release tackles several of them head on. Web admins often panic when a routine patch suddenly blocks checkout pages or API calls, and that is exactly why testing in detection mode first saves hours of troubleshooting. The MongoDB operator detection now uses proper word boundaries to stop legitimate database queries from getting flagged as NoSQL injection attempts. Parameter names containing .history no longer trigger false alarms, and comment-heavy payloads get filtered more cleanly across multiple rules. Dropping HTTP/0.9 GET support from request line validation removes outdated compatibility that only served to confuse traffic analysis. The Windows LOLBIN command list also gets cleaned up by removing url.exe, which was causing unnecessary matches on standard system calls.

Updating Without Breaking Production Environments

Applying this update requires pulling the latest rule files and restarting the web server or reverse proxy that handles ModSecurity. Administrators should run a dry test in detection mode before switching to blocking mode, especially if legacy applications rely on older HTTP standards or unusual header structures. The Perl subdirectory restriction updates also mean that file access rules now cover deeper directory trees where configuration files sometimes hide. Testing with real traffic patterns helps catch any rule conflicts before they take down a live site.

Release OWASP CRS v4.26.0

What's Changed :new: New features and detections :tada: feat: Add WhatWAF to the scanner list by @HackingRepo in #4566 feat: Add ghauri to scanner list by @HackingRepo in #4570 feat: Expand Scanner User Ag...

Release v4.26.0 ยท coreruleset/coreruleset

Keep the rule set updated and watch the logs for any sudden drops in legitimate requests. The team behind OWASP CRS keeps tightening the net without cutting off normal users, so staying current pays off when things get noisy out there. Drop by the comments if you run into a specific rule conflict or need help tuning detection thresholds.