Improper Neutralization of CRLF Sequences ('CRLF Injection') (CWE-93)
Versions of the package yhirose/cpp-httplib before 0.12.4 are vulnerable to CRLF Injection when untrusted user input is used to set the content-type header in the HTTP .Patch, .Post, .Put and .Delete requests. This can lead to logical errors and other misbehaviors. **Note:** This issue is present due to an incomplete fix for [CVE-2020-11709](https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-2366507).
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Feedly found the first article mentioning CVE-2023-26130. See article
EPSS Score was set to: 0.06% (Percentile: 22.7%)
Detection for the vulnerability has been added to Nessus (194897)
Detection for the vulnerability has been added to Qualys (285523)