Home

Description

Granian is a Rust HTTP server for Python applications. From 0.2.0 to 2.7.4, Granian aborts a worker process if a WSGI application returns an invalid HTTP response header name or value. The WSGI response conversion path uses .unwrap() on both the header name and header value constructors, so malformed output from the application becomes a process abort instead of a handled error. This vulnerability is fixed in 2.7.4.

PUBLISHED Reserved 2026-04-28 | Published 2026-05-12 | Updated 2026-05-14 | Assigner GitHub_M




MEDIUM: 5.9CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-248: Uncaught Exception

CWE-755: Improper Handling of Exceptional Conditions

Product status

>= 0.2.0, < 2.7.4
affected

References

github.com/...ranian/security/advisories/GHSA-f5p7-9fr5-8jmj exploit

github.com/...ranian/security/advisories/GHSA-f5p7-9fr5-8jmj

cve.org (CVE-2026-42545)

nvd.nist.gov (CVE-2026-42545)

Download JSON