-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from improper validation of header delimiters and newline characters. HTTP specifications require headers to be terminated with '\r\n\r\n', but many servers accept '\n\n'. Functions responsible for parsing headers (e.g., from globals or raw strings) are likely vulnerable if they: (1) split headers using '\n' instead of '\r\n', (2) allow '\n\n' as a header-body separator, or (3) fail to sanitize '\n' in header names/values. The ServerRequestFactory and Message classes are core components for header parsing in PSR-7 implementations, making these functions high-confidence candidates.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| httpsoft/http-message | composer | < 1.0.12 | 1.0.12 |
Ongoing coverage of React2Shell