CVE-2026-29046 PUBLISHED

TinyWeb: HTTP Header Control Character Injection into CGI Environment

Assigner: GitHub_M
Reserved: 03.03.2026 Published: 06.03.2026 Updated: 06.03.2026

TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to version 2.04, TinyWeb accepts request header values and later maps them into CGI environment variables (HTTP_*). The parser did not strictly reject dangerous control characters in header lines and header values, including CR, LF, and NUL, and did not consistently defend against encoded forms such as %0d, %0a, and %00. This can enable header value confusion across parser boundaries and may create unsafe data in the CGI execution context. This issue has been patched in version 2.04.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:H/SA:L
CVSS Score: 9.2

Product Status

Vendor maximmasiutin
Product TinyWeb
Versions
  • Version < 2.04 is affected

References

Problem Types

  • CWE-114: Process Control CWE
  • CWE-20: Improper Input Validation CWE
  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE
  • CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') CWE