Home

Description

TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to version 2.04, TinyWeb accepts request header values and later maps them into CGI environment variables (HTTP_*). The parser did not strictly reject dangerous control characters in header lines and header values, including CR, LF, and NUL, and did not consistently defend against encoded forms such as %0d, %0a, and %00. This can enable header value confusion across parser boundaries and may create unsafe data in the CGI execution context. This issue has been patched in version 2.04.

PUBLISHED Reserved 2026-03-03 | Published 2026-03-06 | Updated 2026-03-06 | Assigner GitHub_M




CRITICAL: 9.2CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L

Problem types

CWE-114: Process Control

CWE-20: Improper Input Validation

CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')

Product status

< 2.04
affected

References

github.com/...inyWeb/security/advisories/GHSA-r3gf-pg2c-m7mc

github.com/...ommit/53aa8b6e5146491d7be57920e3fc50d7a34e4d5a

cve.org (CVE-2026-29046)

nvd.nist.gov (CVE-2026-29046)

Download JSON