cpp-httplib version v0.17.3 through v0.18.3 fails to filter CRLF characters ("\r\n") when those are prefixed with a null byte. This enables attackers to exploit CRLF injection that could further lead to HTTP Response Splitting, XSS, and more.
References
Link | Resource |
---|---|
https://advisory.checkmarx.net/advisory/CVE-2025-0825/ | Exploit Third Party Advisory |
https://github.com/yhirose/cpp-httplib/commit/9c36aae4b73e2b6e493f4133e4173103c9266289 | Patch |
Configurations
History
04 Aug 2025, 15:06
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
References | () https://advisory.checkmarx.net/advisory/CVE-2025-0825/ - Exploit, Third Party Advisory | |
References | () https://github.com/yhirose/cpp-httplib/commit/9c36aae4b73e2b6e493f4133e4173103c9266289 - Patch | |
CPE | cpe:2.3:a:yhirose:cpp-httplib:*:*:*:*:*:*:*:* | |
First Time |
Yhirose
Yhirose cpp-httplib |
23 May 2025, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
04 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-04 15:15
Updated : 2025-08-04 15:06
NVD link : CVE-2025-0825
Mitre link : CVE-2025-0825
CVE.ORG link : CVE-2025-0825
JSON object : View
Products Affected
yhirose
- cpp-httplib
CWE
CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')