CVE-2025-40927HTTP Request/Response Splitting in Libcgi-simple-perl

Severity
7.3HIGHNVD
OSV4.3
EPSS
0.1%
top 68.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 29

Description

CGI::Simple versions before 1.282 for Perl has a HTTP response splitting flaw This vulnerability is a confirmed HTTP response splitting flaw in CGI::Simple that allows HTTP response header injection, which can be used for reflected XSS or open redirect under certain conditions. Although some validation exists, it can be bypassed using URL-encoded values, allowing an attacker to inject untrusted content into the response via query parameters. As a result, an attacker can inject a line break (e

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 3.9 | Impact: 3.4

Affected Packages1 packages

debiandebian/libcgi-simple-perl< libcgi-simple-perl 1.280-2+deb12u1 (bookworm)

🔴Vulnerability Details

2
OSV
CVE-2025-40927: CGI::Simple versions before 12025-08-29
GHSA
GHSA-wh29-fq99-4ww5: CGI::Simple versions before 12025-08-29

📋Vendor Advisories

1
Debian
CVE-2025-40927: libcgi-simple-perl - CGI::Simple versions before 1.282 for Perl has a HTTP response splitting flaw Th...2025