ModSecurity® Vendors

Valid for versions 82 through 84





Last modified: March 8, 2021


The ModSecurity® Vendors interface allows you to install and manage your ModSecurity vendors.


You must install the ModSecurity Apache module in order to use this interface. Use WHM’s EasyApache 4 interface (WHM >> Home >> Software >> EasyApache 4) or the yum install ea-apache24-mod_security2 command to install the ModSecurity Apache module.


EasyApache 4 loads the /etc/apache2/conf.d/modsec/modsec2.cpanel.conf and /etc/apache2/conf.d/modsec/modsec2.user.conf files as an include.

  • This file’s rules may still affect the way in which ModSecurity functions, which may result in false positives on your system.

  • If you see many false positives, check this file for custom rules.

Add a ModSecurity vendor

To add a ModSecurity vendor, perform the following steps:

  1. Click Add Vendor.

  2. In the Vendor Configuration URL text box, enter the URL for the ModSecurity vendor.

  3. Click Load. The Vendor Name, Vendor Description, Vendor Documentation URL, and Vendor Path text boxes automatically load vendor data.

  4. After you confirm that the vendor data is correct, click Save.


We strongly recommend that you use an SSL-secured URL as the Vendor Configuration URL. This ensures that no one can tamper with vendor-provided updates.

Manage Vendors

Use this section of the interface to manage your ModSecurity® vendors.


To manage these functions from the command line, run the following script as the root user:


Install a ModSecurity vendor

To install a cPanel-provided ModSecurity vendor, click Install for that vendor, and then click Install and Restart Apache.

Enable or disable a vendor

  • To enable a vendor, click On in the Enabled column for that vendor.

  • To disable a vendor, click Off in the Enabled column for that vendor.

Enable or disable updates

When you enable updates, the system retrieves new copies of the vendor metadata from the URL that you used during vendor installation. The system compares the downloaded metadata and automatically fetches and installs new versions of the rule set.

  • To enable automatic updates for a vendor, click On in the Updates column.

  • To disable automatic updates for a vendor, click Off in the Updates column.


The system checks for vendor updates when the /scripts/upcp script runs. For more information, read our How to Update Your System and Update Preferences documentation.

Edit a vendor

The ModSecurity vendor rule sets group common rules into separate configuration files. To selectively enable or disable the configuration files, edit the vendor.

To edit a ModSecurity vendor, perform the following steps:

  1. Click Edit for the vendor that you wish to edit.

  2. Click Enable All, click Disable All, or click the toggle to enable or disable each configuration file.

Delete a vendor

To delete a ModSecurity vendor, locate the vendor in the list, click Delete, and then click Delete.


cPanel’s Redirects interface (cPanel >> Home >> Domains >> Redirects) is not compatible with ModSecurity. To add a redirect, you must disable the REQUEST-31-APPLICATION-ATTACK-RFI.conf file in the modsec_vendor_configs/OWASP/rules directory.

Additional Documentation