HTTP::Tiny versions before 0.093 for Perl do not validate CRLF in HTTP request lines or control field header values
Summary
| CVE | CVE-2026-7010 |
|---|---|
| State | PUBLISHED |
| Assigner | CPANSec |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-11 22:22:14 UTC |
| Updated | 2026-05-12 00:17:03 UTC |
| Description | HTTP::Tiny versions before 0.093 for Perl do not validate CRLF in HTTP request lines or control field header values. The unvalidated inputs are the method and URI in the request line, the URL host that becomes the `Host:` header, and HTTP/1.1 control data field values. An attacker who controls one of these inputs, for example a user supplied URL passed to a webhook or URL fetch endpoint, can inject additional headers and smuggle requests to the upstream server. |
Risk And Classification
Problem Types: CWE-113 | CWE-113 CWE-113 Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| github.com/Perl-Toolchain-Gang/HTTP-Tiny/commit/d73c7651e82ace02693842df... | 9b29abf9-4ab0-4765-b253-1875cd9b441e | github.com | |
| metacpan.org/release/HAARG/HTTP-Tiny-0.093-TRIAL/changes | 9b29abf9-4ab0-4765-b253-1875cd9b441e | metacpan.org | |
| www.openwall.com/lists/oss-security/2026/05/11/17 | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2026-04-25T00:00:00.000Z | Issue discovered. |
| CNA | 2026-05-11T00:00:00.000Z | HTTP-Tiny 0.093-TRIAL published with fix. |
Solutions
CNA: Upgrade to HTTP-Tiny 0.093-TRIAL or later.
There are currently no legacy QID mappings associated with this CVE.