CVE-2026-42545 PUBLISHED

Granian: DoS via WSGI response header panic

Assigner: GitHub_M
Reserved: 28.04.2026 Published: 12.05.2026 Updated: 12.05.2026

Granian is a Rust HTTP server for Python applications. From 0.2.0 to 2.7.4, Granian aborts a worker process if a WSGI application returns an invalid HTTP response header name or value. The WSGI response conversion path uses .unwrap() on both the header name and header value constructors, so malformed output from the application becomes a process abort instead of a handled error. This vulnerability is fixed in 2.7.4.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 5.9

Product Status

Vendor emmett-framework
Product granian
Versions
  • Version >= 0.2.0, < 2.7.4 is affected

References

Problem Types

  • CWE-248: Uncaught Exception CWE
  • CWE-755: Improper Handling of Exceptional Conditions CWE