We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-40907

FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library



Description

FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library. The included FastCGI library is affected by CVE-2025-23016, causing an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.

Reserved 2025-04-16 | Published 2025-05-16 | Updated 2025-05-16 | Assigner CPANSec

Problem types

CWE-1395: Dependency on Vulnerable Third-Party Component

Product status

Default status
unaffected

0.44
affected

Credits

Synacktiv finder

References

www.openwall.com/lists/oss-security/2025/04/23/4 mailing-list

github.com/FastCGI-Archives/fcgi2/issues/67 issue-tracking

github.com/FastCGI-Archives/fcgi2/releases/tag/2.4.5 patch

www.synacktiv.com/...25-23016-exploiting-the-fastcgi-library technical-description

github.com/perl-catalyst/FCGI/issues/14 issue-tracking

patch-diff.githubusercontent.com/...ives/fcgi2/pull/74.patch patch

cve.org (CVE-2025-40907)

nvd.nist.gov (CVE-2025-40907)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-40907

Support options

Helpdesk Chat, Email, Knowledgebase