CVE Vulnerabilities

CVE-2025-27111

Improper Neutralization of CRLF Sequences ('CRLF Injection')

Published: Mar 04, 2025 | Modified: Nov 03, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Rack is a modular Ruby web server interface. The Rack::Sendfile middleware logs unsanitised header values from the X-Sendfile-Type header. An attacker can exploit this by injecting escape sequences (such as newline characters) into the header, resulting in log injection. This vulnerability is fixed in 2.2.12, 3.0.13, and 3.1.11.

Weakness

The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.

Affected Software

NameVendorStart VersionEnd Version
RackRack*2.2.12 (excluding)
RackRack3.0.0 (including)3.0.13 (excluding)
RackRack3.1.0 (including)3.1.11 (excluding)
Ruby-rackUbuntudevel*
Ruby-rackUbuntuesm-apps/bionic*
Ruby-rackUbuntuesm-apps/focal*
Ruby-rackUbuntuesm-apps/jammy*
Ruby-rackUbuntuesm-apps/xenial*
Ruby-rackUbuntuesm-infra-legacy/trusty*
Ruby-rackUbuntufocal*
Ruby-rackUbuntujammy*
Ruby-rackUbuntunoble*
Ruby-rackUbuntuoracular*
Ruby-rackUbuntuplucky*
Ruby-rackUbuntuquesting*
Ruby-rackUbuntuupstream*

Potential Mitigations

References