We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-40911

Net::CIDR::Set versions 0.10 through 0.13 for Perl does not properly consider leading zero characters in IP CIDR address strings, which could allow attackers to bypass access control that is based on IP addresses



Description

Net::CIDR::Set versions 0.10 through 0.13 for Perl does not properly handle leading zero characters in IP CIDR address strings, which could allow attackers to bypass access control that is based on IP addresses. Leading zeros are used to indicate octal numbers, which can confuse users who are intentionally using octal notation, as well as users who believe they are using decimal notation. Net::CIDR::Set used code from Net::CIDR::Lite, which had a similar vulnerability CVE-2021-47154.

Reserved 2025-04-16 | Published 2025-05-27 | Updated 2025-05-28 | Assigner CPANSec

Problem types

CWE-1287 Improper Validation of Specified Type of Input

Product status

Default status
unaffected

0.10
affected

References

metacpan.org/release/RRWO/Net-CIDR-Set-0.14/changes release-notes

github.com/...be7d91e8446ad8013b08b4be313d666dab003a8a.patch patch

blog.urth.org/...security-issues-in-perl-ip-address-distros/ related

cve.org (CVE-2025-40911)

nvd.nist.gov (CVE-2025-40911)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-40911

Support options

Helpdesk Chat, Email, Knowledgebase