Home

Description

HTTP::Tiny versions before 0.093 for Perl do not validate CRLF in HTTP request lines or control field header values. The unvalidated inputs are the method and URI in the request line, the URL host that becomes the `Host:` header, and HTTP/1.1 control data field values. An attacker who controls one of these inputs, for example a user supplied URL passed to a webhook or URL fetch endpoint, can inject additional headers and smuggle requests to the upstream server.

PUBLISHED Reserved 2026-04-25 | Published 2026-05-11 | Updated 2026-05-12 | Assigner CPANSec

Problem types

CWE-113 Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

Product status

Default status
unaffected

Any version before 0.093
affected

Timeline

2026-04-25:Issue discovered.
2026-05-11:HTTP-Tiny 0.093-TRIAL published with fix.

References

www.openwall.com/lists/oss-security/2026/05/11/17

github.com/...d73c7651e82ace02693842df55928b6c3ae7c38d.patch patch

metacpan.org/release/HAARG/HTTP-Tiny-0.093-TRIAL/changes release-notes

cve.org (CVE-2026-7010)

nvd.nist.gov (CVE-2026-7010)

Download JSON