{"api_version":"1","generated_at":"2026-05-14T11:44:37+00:00","cve":"CVE-2026-8500","urls":{"html":"https://cve.report/CVE-2026-8500","api":"https://cve.report/api/cve/CVE-2026-8500.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-8500","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-8500"},"summary":{"title":"Web::Passwd versions through 0.03 for Perl is vulnerable to RCE","description":"Web::Passwd versions through 0.03 for Perl is vulnerable to RCE.\n\nWeb::Passwd is a small CGI application for managing htpasswd files using the htpasswd command.\n\nThe user parameter is not validated or escaped, and is used as the last argument on the command line, allowing for command injection.","state":"PUBLISHED","assigner":"CPANSec","published_at":"2026-05-13 23:16:43","updated_at":"2026-05-14 02:17:22"},"problem_types":["CWE-78","CWE-78 CWE-78 Improper Neutralization of Special Elements used in an OS Command"],"metrics":[],"references":[{"url":"https://httpd.apache.org/docs/current/programs/htpasswd.html","name":"https://httpd.apache.org/docs/current/programs/htpasswd.html","refsource":"9b29abf9-4ab0-4765-b253-1875cd9b441e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.openwall.com/lists/oss-security/2026/05/13/8","name":"http://www.openwall.com/lists/oss-security/2026/05/13/8","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://metacpan.org/release/EVANK/Web-Passwd-0.03","name":"https://metacpan.org/release/EVANK/Web-Passwd-0.03","refsource":"9b29abf9-4ab0-4765-b253-1875cd9b441e","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-8500","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-8500","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"EVANK","product":"Web::Passwd","version":"affected 0.03 custom","platforms":[]}],"timeline":[{"source":"CNA","time":"2007-02-08T00:00:00.000Z","lang":"en","value":"Web::Passwd 0.03 was released"}],"solutions":[{"source":"CNA","title":"","value":"This application has not been updated since 2007 and appears to have been abandoned. Use other solutions.","time":"","lang":"en"}],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2026-05-14T00:35:26.211Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"http://www.openwall.com/lists/oss-security/2026/05/13/8"}],"title":"CVE Program Container"}],"cna":{"affected":[{"collectionURL":"https://cpan.org/modules","defaultStatus":"unaffected","packageName":"Web-Passwd","product":"Web::Passwd","programFiles":["lib/Web/Passwd.pm"],"programRoutines":[{"name":"Web::Passwd::htfile_moduser"},{"name":"Web::Passwd::htfile_deluser"}],"vendor":"EVANK","versions":[{"lessThanOrEqual":"0.03","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"Web::Passwd versions through 0.03 for Perl is vulnerable to RCE.\n\nWeb::Passwd is a small CGI application for managing htpasswd files using the htpasswd command.\n\nThe user parameter is not validated or escaped, and is used as the last argument on the command line, allowing for command injection."}],"impacts":[{"capecId":"CAPEC-88","descriptions":[{"lang":"en","value":"CAPEC-88 OS Command Injection"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-13T22:24:42.216Z","orgId":"9b29abf9-4ab0-4765-b253-1875cd9b441e","shortName":"CPANSec"},"references":[{"url":"https://metacpan.org/release/EVANK/Web-Passwd-0.03"},{"url":"https://httpd.apache.org/docs/current/programs/htpasswd.html"}],"solutions":[{"lang":"en","value":"This application has not been updated since 2007 and appears to have been abandoned. Use other solutions."}],"source":{"discovery":"UNKNOWN"},"timeline":[{"lang":"en","time":"2007-02-08T00:00:00.000Z","value":"Web::Passwd 0.03 was released"}],"title":"Web::Passwd versions through 0.03 for Perl is vulnerable to RCE","x_generator":{"engine":"cpansec-cna-tool 0.1"}}},"cveMetadata":{"assignerOrgId":"9b29abf9-4ab0-4765-b253-1875cd9b441e","assignerShortName":"CPANSec","cveId":"CVE-2026-8500","datePublished":"2026-05-13T22:24:42.216Z","dateReserved":"2026-05-13T20:31:51.641Z","dateUpdated":"2026-05-14T00:35:26.211Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-13 23:16:43","lastModifiedDate":"2026-05-14 02:17:22","problem_types":["CWE-78","CWE-78 CWE-78 Improper Neutralization of Special Elements used in an OS Command"],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"8500","Ordinal":"1","Title":"Web::Passwd versions through 0.03 for Perl is vulnerable to RCE","CVE":"CVE-2026-8500","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"8500","Ordinal":"1","NoteData":"Web::Passwd versions through 0.03 for Perl is vulnerable to RCE.\n\nWeb::Passwd is a small CGI application for managing htpasswd files using the htpasswd command.\n\nThe user parameter is not validated or escaped, and is used as the last argument on the command line, allowing for command injection.","Type":"Description","Title":"Web::Passwd versions through 0.03 for Perl is vulnerable to RCE"}]}}}