Description
Net::CIDR::Lite versions before 0.24 for Perl does not properly validate IP address and CIDR mask inputs, which may allow IP ACL bypass. Inputs containing a trailing newline or non-ASCII digit characters pass the validators but are then re-encoded by the parser to a different address than the input string spelled. find() and bin_find() can match or miss addresses as a result. Example: my $cidr = Net::CIDR::Lite->new(); $cidr->add("::1\n/128"); $cidr->find("::1a"); # incorrectly returns true See also CVE-2026-45191.
Problem types
CWE-1289 Improper Validation of Unsafe Equivalence in Input
Product status
Any version before 0.24
Timeline
| 2026-05-10: | Vulnerability found |
| 2026-05-10: | Net-CIDR-Lite version 0.24 released |
References
github.com/...ca9542adec87110556601d7ce48381ea8d13e692.patch
metacpan.org/release/STIGTSP/Net-CIDR-Lite-0.24/changes
www.cve.org/CVERecord?id=CVE-2026-45191