The unvalidated inputs are the method and URI in the request line, the URL host that becomes the `Host:` header, and HTTP/1.1 control data field values.
An attacker who controls one of these inputs, for example a user supplied URL passed to a webhook or URL fetch endpoint, can inject additional headers and smuggle requests to the upstream server.
No advisories yet.
Solution
Upgrade to HTTP-Tiny 0.093-TRIAL or later.
Workaround
No workaround given by the vendor.
Tue, 12 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Haarg
Haarg http::tiny |
|
| Vendors & Products |
Haarg
Haarg http::tiny |
Tue, 12 May 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 11 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HTTP::Tiny versions before 0.093 for Perl do not validate CRLF in HTTP request lines or control field header values. The unvalidated inputs are the method and URI in the request line, the URL host that becomes the `Host:` header, and HTTP/1.1 control data field values. An attacker who controls one of these inputs, for example a user supplied URL passed to a webhook or URL fetch endpoint, can inject additional headers and smuggle requests to the upstream server. | |
| Title | HTTP::Tiny versions before 0.093 for Perl do not validate CRLF in HTTP request lines or control field header values | |
| Weaknesses | CWE-113 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-12T14:45:06.662Z
Reserved: 2026-04-25T09:18:30.030Z
Link: CVE-2026-7010
Updated: 2026-05-12T14:43:42.474Z
Status : Deferred
Published: 2026-05-11T22:22:14.750
Modified: 2026-05-12T16:48:58.260
Link: CVE-2026-7010
No data.
OpenCVE Enrichment
Updated: 2026-05-12T16:30:19Z