CVE-2025-0825

cpp-httplib version v0.17.3 through v0.18.3 fails to filter CRLF characters ("\r\n") when those are prefixed with a null byte. This enables attackers to exploit CRLF injection that could further lead to HTTP Response Splitting, XSS, and more.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yhirose:cpp-httplib:*:*:*:*:*:*:*:*

History

04 Aug 2025, 15:06

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References () https://advisory.checkmarx.net/advisory/CVE-2025-0825/ - () https://advisory.checkmarx.net/advisory/CVE-2025-0825/ - Exploit, Third Party Advisory
References () https://github.com/yhirose/cpp-httplib/commit/9c36aae4b73e2b6e493f4133e4173103c9266289 - () https://github.com/yhirose/cpp-httplib/commit/9c36aae4b73e2b6e493f4133e4173103c9266289 - Patch
CPE cpe:2.3:a:yhirose:cpp-httplib:*:*:*:*:*:*:*:*
First Time Yhirose
Yhirose cpp-httplib

23 May 2025, 13:15

Type Values Removed Values Added
Summary
  • (es) La versión v0.17.3 a v0.18.3 de cpp-httplib no filtra los caracteres CRLF ("\r\n") cuando tienen como prefijo un byte nulo. Esto permite a los atacantes aprovechar la inyección CRLF que podría conducir a la división de la respuesta HTTP, XSS y más.
References
  • () https://advisory.checkmarx.net/advisory/CVE-2025-0825/ -

04 Feb 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-04 15:15

Updated : 2025-08-04 15:06


NVD link : CVE-2025-0825

Mitre link : CVE-2025-0825

CVE.ORG link : CVE-2025-0825


JSON object : View

Products Affected

yhirose

  • cpp-httplib
CWE
CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')