Home

Description

Net::CIDR::Lite versions before 0.24 for Perl does not properly validate IP address and CIDR mask inputs, which may allow IP ACL bypass. Inputs containing a trailing newline or non-ASCII digit characters pass the validators but are then re-encoded by the parser to a different address than the input string spelled. find() and bin_find() can match or miss addresses as a result. Example: my $cidr = Net::CIDR::Lite->new(); $cidr->add("::1\n/128"); $cidr->find("::1a"); # incorrectly returns true See also CVE-2026-45191.

PUBLISHED Reserved 2026-05-10 | Published 2026-05-10 | Updated 2026-05-10 | Assigner CPANSec

Problem types

CWE-1289 Improper Validation of Unsafe Equivalence in Input

Product status

Default status
unaffected

Any version before 0.24
affected

Timeline

2026-05-10:Vulnerability found
2026-05-10:Net-CIDR-Lite version 0.24 released

References

github.com/...ca9542adec87110556601d7ce48381ea8d13e692.patch patch

metacpan.org/release/STIGTSP/Net-CIDR-Lite-0.24/changes release-notes

www.cve.org/CVERecord?id=CVE-2026-45191 related

cve.org (CVE-2026-45190)

nvd.nist.gov (CVE-2026-45190)

Download JSON