We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-40910

Net::IP::LPM version 1.10 for Perl does not properly consider leading zero characters in IP CIDR address strings, which could allow attackers to bypass access control that is based on IP addresses



Description

Net::IP::LPM version 1.10 for Perl does not properly consider leading zero characters in IP CIDR address strings, which could allow attackers to bypass access control that is based on IP addresses. Leading zeros are used to indicate octal numbers, which can confuse users who are intentionally using octal notation, as well as users who believe they are using decimal notation.

Reserved 2025-04-16 | Published 2025-06-27 | Updated 2025-06-27 | Assigner CPANSec

Problem types

CWE-1287 Improper Validation of Specified Type of Input

Product status

Default status
unaffected

1.10
affected

References

metacpan.org/...iff/TPODER/Net-IP-LPM-1.09/lib/Net/IP/LPM.pm

blog.urth.org/...security-issues-in-perl-ip-address-distros/

security.metacpan.org/...IP-LPM/1.10/CVE-2025-40910-r1.patch patch

cve.org (CVE-2025-40910)

nvd.nist.gov (CVE-2025-40910)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-40910

Support options

Helpdesk Chat, Email, Knowledgebase