{"api_version":"1","generated_at":"2026-05-12T11:06:11+00:00","cve":"CVE-2026-7010","urls":{"html":"https://cve.report/CVE-2026-7010","api":"https://cve.report/api/cve/CVE-2026-7010.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-7010","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-7010"},"summary":{"title":"HTTP::Tiny versions before 0.093 for Perl do not validate CRLF in HTTP request lines or control field header values","description":"HTTP::Tiny versions before 0.093 for Perl do not validate CRLF in HTTP request lines or control field header values.\n\nThe unvalidated inputs are the method and URI in the request line, the URL host that becomes the `Host:` header, and HTTP/1.1 control data field values.\n\nAn attacker who controls one of these inputs, for example a user supplied URL passed to a webhook or URL fetch endpoint, can inject additional headers and smuggle requests to the upstream server.","state":"PUBLISHED","assigner":"CPANSec","published_at":"2026-05-11 22:22:14","updated_at":"2026-05-12 00:17:03"},"problem_types":["CWE-113","CWE-113 CWE-113 Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')"],"metrics":[],"references":[{"url":"https://github.com/Perl-Toolchain-Gang/HTTP-Tiny/commit/d73c7651e82ace02693842df55928b6c3ae7c38d.patch","name":"https://github.com/Perl-Toolchain-Gang/HTTP-Tiny/commit/d73c7651e82ace02693842df55928b6c3ae7c38d.patch","refsource":"9b29abf9-4ab0-4765-b253-1875cd9b441e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://metacpan.org/release/HAARG/HTTP-Tiny-0.093-TRIAL/changes","name":"https://metacpan.org/release/HAARG/HTTP-Tiny-0.093-TRIAL/changes","refsource":"9b29abf9-4ab0-4765-b253-1875cd9b441e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2026/05/11/17","name":"http://www.openwall.com/lists/oss-security/2026/05/11/17","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-7010","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-7010","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"HAARG","product":"HTTP::Tiny","version":"affected 0.093 custom","platforms":[]}],"timeline":[{"source":"CNA","time":"2026-04-25T00:00:00.000Z","lang":"en","value":"Issue discovered."},{"source":"CNA","time":"2026-05-11T00:00:00.000Z","lang":"en","value":"HTTP-Tiny 0.093-TRIAL published with fix."}],"solutions":[{"source":"CNA","title":"","value":"Upgrade to HTTP-Tiny 0.093-TRIAL or later.","time":"","lang":"en"}],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2026-05-11T23:19:47.588Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"http://www.openwall.com/lists/oss-security/2026/05/11/17"}],"title":"CVE Program Container"}],"cna":{"affected":[{"collectionURL":"https://cpan.org/modules","defaultStatus":"unaffected","packageName":"HTTP-Tiny","product":"HTTP::Tiny","programFiles":["lib/HTTP/Tiny.pm"],"repo":"https://github.com/Perl-Toolchain-Gang/HTTP-Tiny","vendor":"HAARG","versions":[{"lessThan":"0.093","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"HTTP::Tiny versions before 0.093 for Perl do not validate CRLF in HTTP request lines or control field header values.\n\nThe unvalidated inputs are the method and URI in the request line, the URL host that becomes the `Host:` header, and HTTP/1.1 control data field values.\n\nAn attacker who controls one of these inputs, for example a user supplied URL passed to a webhook or URL fetch endpoint, can inject additional headers and smuggle requests to the upstream server."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-113","description":"CWE-113 Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-11T21:14:20.581Z","orgId":"9b29abf9-4ab0-4765-b253-1875cd9b441e","shortName":"CPANSec"},"references":[{"tags":["patch"],"url":"https://github.com/Perl-Toolchain-Gang/HTTP-Tiny/commit/d73c7651e82ace02693842df55928b6c3ae7c38d.patch"},{"tags":["release-notes"],"url":"https://metacpan.org/release/HAARG/HTTP-Tiny-0.093-TRIAL/changes"}],"solutions":[{"lang":"en","value":"Upgrade to HTTP-Tiny 0.093-TRIAL or later."}],"source":{"discovery":"UNKNOWN"},"timeline":[{"lang":"en","time":"2026-04-25T00:00:00.000Z","value":"Issue discovered."},{"lang":"en","time":"2026-05-11T00:00:00.000Z","value":"HTTP-Tiny 0.093-TRIAL published with fix."}],"title":"HTTP::Tiny versions before 0.093 for Perl do not validate CRLF in HTTP request lines or control field header values","x_generator":{"engine":"cpansec-cna-tool 0.1"}}},"cveMetadata":{"assignerOrgId":"9b29abf9-4ab0-4765-b253-1875cd9b441e","assignerShortName":"CPANSec","cveId":"CVE-2026-7010","datePublished":"2026-05-11T21:14:20.581Z","dateReserved":"2026-04-25T09:18:30.030Z","dateUpdated":"2026-05-11T23:19:47.588Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-11 22:22:14","lastModifiedDate":"2026-05-12 00:17:03","problem_types":["CWE-113","CWE-113 CWE-113 Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')"],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"7010","Ordinal":"1","Title":"HTTP::Tiny versions before 0.093 for Perl do not validate CRLF i","CVE":"CVE-2026-7010","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"7010","Ordinal":"1","NoteData":"HTTP::Tiny versions before 0.093 for Perl do not validate CRLF in HTTP request lines or control field header values.\n\nThe unvalidated inputs are the method and URI in the request line, the URL host that becomes the `Host:` header, and HTTP/1.1 control data field values.\n\nAn attacker who controls one of these inputs, for example a user supplied URL passed to a webhook or URL fetch endpoint, can inject additional headers and smuggle requests to the upstream server.","Type":"Description","Title":"HTTP::Tiny versions before 0.093 for Perl do not validate CRLF i"}]}}}