CVE-2025-55763

NameCVE-2025-55763
DescriptionBuffer Overflow in the URI parser of CivetWeb 1.14 through 1.16 (latest) allows a remote attacker to achieve remote code execution via a crafted HTTP request. This vulnerability is triggered during request processing and may allow an attacker to corrupt heap memory, potentially leading to denial of service or arbitrary code execution.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1112507

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
civetweb (PTS)bullseye1.13+dfsg-5vulnerable
bookworm1.15+dfsg-4vulnerable
forky, sid, trixie1.16+dfsg-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
civetwebsource(unstable)(unfixed)1112507

Notes

[trixie] - civetweb <no-dsa> (Minor issue)
[bookworm] - civetweb <no-dsa> (Minor issue)
https://github.com/krispybyte/CVE-2025-55763
https://github.com/civetweb/civetweb/pull/1347
https://github.com/civetweb/civetweb/issues/1348
Fixed by: https://github.com/civetweb/civetweb/commit/76e222bcb77ba8452e5da4e82ae6cecd499c25e0
Fixed by: https://github.com/civetweb/civetweb/commit/d5321963b1d0bc953101de91f8588bf83db73bf5

Search for package or bug name: Reporting problems