cpp-httplib version v0.17.3 through v0.18.3 fails to filter CRLF characters ("\r\n") when those are prefixed with a null byte. This enables attackers to exploit CRLF injection that could further lead to HTTP Response Splitting, XSS, and more.
References
| Link | Resource |
|---|---|
| https://advisory.checkmarx.net/advisory/CVE-2025-0825/ | Exploit Third Party Advisory |
| https://github.com/yhirose/cpp-httplib/commit/9c36aae4b73e2b6e493f4133e4173103c9266289 | Patch |
Configurations
History
No history.
Information
Published : 2025-02-04 15:15
Updated : 2025-08-04 15:06
NVD link : CVE-2025-0825
Mitre link : CVE-2025-0825
CVE.ORG link : CVE-2025-0825
JSON object : View
Products Affected
yhirose
- cpp-httplib
CWE
CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
