We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53007

arduino-esp32 vulnerable to CRLF injection in WebServer.cpp



Description

arduino-esp32 provides an Arduino core for the ESP32. Versions prior to 3.3.0-RC1 and 3.2.1 contain a HTTP Response Splitting vulnerability. The `sendHeader` function takes arbitrary input for the HTTP header name and value, concatenates them into an HTTP header line, and appends this to the outgoing HTTP response headers. There is no validation or sanitization of the `name` or `value` parameters before they are included in the HTTP response. If an attacker can control the input to `sendHeader` (either directly or indirectly), they could inject carriage return (`\r`) or line feed (`\n`) characters into either the header name or value. This could allow the attacker to inject additional headers, manipulate the structure of the HTTP response, potentially inject an entire new HTTP response (HTTP Response Splitting), and/or ause header confusion or other HTTP protocol attacks. Versions 3.3.0-RC1 and 3.2.1 contain a fix for the issue.

Reserved 2025-06-24 | Published 2025-06-26 | Updated 2025-06-26 | Assigner GitHub_M


HIGH: 8.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

Problem types

CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

Product status

< 3.2.1
affected

>= 3.3.0-alpha1, < 3.3.0-RC1
affected

References

github.com/...-esp32/security/advisories/GHSA-5476-9jjq-563m

github.com/...ommit/21640ac82a1bb5efa8cf0b3841be1ac80add6785

github.com/...bafca077/libraries/WebServer/src/WebServer.cpp

github.com/...bafca077/libraries/WebServer/src/WebServer.cpp

cve.org (CVE-2025-53007)

nvd.nist.gov (CVE-2025-53007)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53007

Support options

Helpdesk Chat, Email, Knowledgebase