Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-40927
PUBLISHED
More InfoOfficial Page
Assigner-CPANSec
Assigner Org ID-9b29abf9-4ab0-4765-b253-1875cd9b441e
View Known Exploited Vulnerability (KEV) details
Published At-29 Aug, 2025 | 00:10
Updated At-29 Aug, 2025 | 13:18
Rejected At-
▼CVE Numbering Authority (CNA)
CGI::Simple versions 1.281 and earlier for Perl has a HTTP response splitting flaw

CGI::Simple versions before 1.282 for Perl has a HTTP response splitting flaw This vulnerability is a confirmed HTTP response splitting flaw in CGI::Simple that allows HTTP response header injection, which can be used for reflected XSS or open redirect under certain conditions. Although some validation exists, it can be bypassed using URL-encoded values, allowing an attacker to inject untrusted content into the response via query parameters. As a result, an attacker can inject a line break (e.g. %0A) into the parameter value, causing the server to split the HTTP response and inject arbitrary headers or even an HTML/JavaScript body, leading to reflected cross-site scripting (XSS), open redirect or other attacks. The issue documented in CVE-2010-4410 https://www.cve.org/CVERecord?id=CVE-2010-4410 is related but the fix was incomplete. Impact By injecting %0A (newline) into a query string parameter, an attacker can: * Break the current HTTP header * Inject a new header or entire body * Deliver a script payload that is reflected in the server’s response That can lead to the following attacks: * reflected XSS * open redirect * cache poisoning * header manipulation

Affected Products
Vendor
MANWAR
Product
CGI::Simple
Collection URL
https://cpan.org/modules
Package Name
CGI-Simple
Repo
https://github.com/manwar/CGI--Simple
Program Files
  • lib/CGI/Simple.pm
Default Status
unaffected
Versions
Affected
  • From 0 before 1.282 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-113CWE-113 Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-34CAPEC-34 HTTP Response Splitting
Solutions

Upgrade CGI::Simple to version 1.282 or higher

Configurations

Workarounds

Exploits

Credits

finder
Maxim Kosenko
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://metacpan.org/release/MANWAR/CGI-Simple-1.281/source/lib/CGI/Simple.pm#L1031-1035
related
https://metacpan.org/release/MANWAR/CGI-Simple-1.281/diff/MANWAR/CGI-Simple-1.282/lib/CGI/Simple.pm
related
https://owasp.org/www-community/attacks/HTTP_Response_Splitting
technical-description
https://datatracker.ietf.org/doc/html/rfc7230#section-3
technical-description
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2320
related
https://rt.perl.org/Public/Bug/Display.html?id=21951
related
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.17.3HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found