Web::Passwd is a small CGI application for managing htpasswd files using the htpasswd command.
The user parameter is not validated or escaped, and is used as the last argument on the command line, allowing for command injection.
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
This application has not been updated since 2007 and appears to have been abandoned. Use other solutions.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Evank
Evank web::passwd |
|
| Vendors & Products |
Evank
Evank web::passwd |
Thu, 14 May 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 13 May 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Web::Passwd versions through 0.03 for Perl is vulnerable to RCE. Web::Passwd is a small CGI application for managing htpasswd files using the htpasswd command. The user parameter is not validated or escaped, and is used as the last argument on the command line, allowing for command injection. | |
| Title | Web::Passwd versions through 0.03 for Perl is vulnerable to RCE | |
| Weaknesses | CWE-78 | |
| References |
|
Status: PUBLISHED
Assigner: CPANSec
Published:
Updated: 2026-05-14T17:41:51.045Z
Reserved: 2026-05-13T20:31:51.641Z
Link: CVE-2026-8500
Updated: 2026-05-14T00:35:26.211Z
Status : Deferred
Published: 2026-05-13T23:16:43.237
Modified: 2026-05-14T18:16:51.490
Link: CVE-2026-8500
No data.
OpenCVE Enrichment
Updated: 2026-05-14T20:30:04Z