TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to version 2.04, TinyWeb accepts request header values and later maps them into CGI environment variables (HTTP_*). The parser did not strictly reject dangerous control characters in header lines and header values, including CR, LF, and NUL, and did not consistently defend against encoded forms such as %0d, %0a, and %00. This can enable header value confusion across parser boundaries and may create unsafe data in the CGI execution context. This issue has been patched in version 2.04.
References
| Link | Resource |
|---|---|
| https://github.com/maximmasiutin/TinyWeb/commit/53aa8b6e5146491d7be57920e3fc50d7a34e4d5a | Patch |
| https://github.com/maximmasiutin/TinyWeb/security/advisories/GHSA-r3gf-pg2c-m7mc | Exploit Vendor Advisory |
Configurations
History
16 Mar 2026, 15:00
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:ritlabs:tinyweb:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.2 |
| First Time |
Ritlabs tinyweb
Ritlabs |
|
| References | () https://github.com/maximmasiutin/TinyWeb/commit/53aa8b6e5146491d7be57920e3fc50d7a34e4d5a - Patch | |
| References | () https://github.com/maximmasiutin/TinyWeb/security/advisories/GHSA-r3gf-pg2c-m7mc - Exploit, Vendor Advisory |
09 Mar 2026, 13:36
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
06 Mar 2026, 04:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-06 04:16
Updated : 2026-03-16 15:00
NVD link : CVE-2026-29046
Mitre link : CVE-2026-29046
CVE.ORG link : CVE-2026-29046
JSON object : View
Products Affected
ritlabs
- tinyweb
