Web::Passwd versions through 0.03 for Perl is vulnerable to RCE
Summary
| CVE | CVE-2026-8500 |
|---|---|
| State | PUBLISHED |
| Assigner | CPANSec |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-13 23:16:43 UTC |
| Updated | 2026-05-14 02:17:22 UTC |
| Description | Web::Passwd versions through 0.03 for Perl is vulnerable to RCE. Web::Passwd is a small CGI application for managing htpasswd files using the htpasswd command. The user parameter is not validated or escaped, and is used as the last argument on the command line, allowing for command injection. |
Risk And Classification
Problem Types: CWE-78 | CWE-78 CWE-78 Improper Neutralization of Special Elements used in an OS Command
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| httpd.apache.org/docs/current/programs/htpasswd.html | 9b29abf9-4ab0-4765-b253-1875cd9b441e | httpd.apache.org | |
| www.openwall.com/lists/oss-security/2026/05/13/8 | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| metacpan.org/release/EVANK/Web-Passwd-0.03 | 9b29abf9-4ab0-4765-b253-1875cd9b441e | metacpan.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2007-02-08T00:00:00.000Z | Web::Passwd 0.03 was released |
Solutions
CNA: This application has not been updated since 2007 and appears to have been abandoned. Use other solutions.
There are currently no legacy QID mappings associated with this CVE.