-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stemmed from improper neutralization of CR/LF sequences in HTTP headers. The commit diff shows these functions were modified to add CR/LF sanitization by replacing them with spaces. Prior to this fix, these functions processed header values without validating against CR/LF injection, making them the entry points for HTTP response splitting. The HttpString constructor was also hardened to reject newlines, but the primary vulnerable paths were in header value handling during protocol encoding/response writing.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.wildfly:wildfly-undertow | maven | >= 10.0.0.Final, <= 10.1.0.Final | 11.0.0.Final |
KEV Misses 88% of Exploited CVEs- Get the report