-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| undici | npm | <= 5.8.1 | 5.8.2 |
The vulnerability manifests in the header processing logic of undici's request mechanism. The commit diff shows a critical modification in processHeader() where a headerCharRegex check was added specifically for Content-Type header values. Prior to the patch, the function only checked the header key was 'content-type' without validating the header value. This allowed CRLF sequences in the value to split the request into multiple malicious requests. The added test case in request-crlf.js directly validates this scenario, confirming the vulnerable code path was in the header processing function.
KEV Misses 88% of Exploited CVEs- Get the report