Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 16 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ritlabs
Ritlabs tinyweb |
|
| CPEs | cpe:2.3:a:ritlabs:tinyweb:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ritlabs
Ritlabs tinyweb |
|
| Metrics |
cvssV3_1
|
Fri, 06 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Maximmasiutin
Maximmasiutin tinyweb |
|
| Vendors & Products |
Maximmasiutin
Maximmasiutin tinyweb |
Fri, 06 Mar 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to version 2.04, TinyWeb accepts request header values and later maps them into CGI environment variables (HTTP_*). The parser did not strictly reject dangerous control characters in header lines and header values, including CR, LF, and NUL, and did not consistently defend against encoded forms such as %0d, %0a, and %00. This can enable header value confusion across parser boundaries and may create unsafe data in the CGI execution context. This issue has been patched in version 2.04. | |
| Title | TinyWeb: HTTP Header Control Character Injection into CGI Environment | |
| Weaknesses | CWE-114 CWE-20 CWE-74 CWE-93 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-06T16:10:18.974Z
Reserved: 2026-03-03T17:50:11.243Z
Link: CVE-2026-29046
Updated: 2026-03-06T16:00:28.596Z
Status : Analyzed
Published: 2026-03-06T04:16:08.740
Modified: 2026-03-16T15:00:12.227
Link: CVE-2026-29046
No data.
OpenCVE Enrichment
Updated: 2026-04-17T12:30:06Z