TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to version 2.04, TinyWeb accepts request header values and later maps them into CGI environment variables (HTTP_*). The parser did not strictly reject dangerous control characters in header lines and header values, including CR, LF, and NUL, and did not consistently defend against encoded forms such as %0d, %0a, and %00. This can enable header value confusion across parser boundaries and may create unsafe data in the CGI execution context. This issue has been patched in version 2.04.
References
| Link | Resource |
|---|---|
| https://github.com/maximmasiutin/TinyWeb/commit/53aa8b6e5146491d7be57920e3fc50d7a34e4d5a | Patch |
| https://github.com/maximmasiutin/TinyWeb/security/advisories/GHSA-r3gf-pg2c-m7mc | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-06 04:16
Updated : 2026-03-16 15:00
NVD link : CVE-2026-29046
Mitre link : CVE-2026-29046
CVE.ORG link : CVE-2026-29046
JSON object : View
Products Affected
ritlabs
- tinyweb
