Name | CVE-2025-55763 |
Description | Buffer Overflow in the URI parser of CivetWeb 1.14 through 1.16 (latest) allows a remote attacker to achieve remote code execution via a crafted HTTP request. This vulnerability is triggered during request processing and may allow an attacker to corrupt heap memory, potentially leading to denial of service or arbitrary code execution. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1112507 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
civetweb (PTS) | bullseye | 1.13+dfsg-5 | vulnerable |
bookworm | 1.15+dfsg-4 | vulnerable | |
forky, sid, trixie | 1.16+dfsg-2 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
civetweb | source | (unstable) | (unfixed) | 1112507 |
[trixie] - civetweb <no-dsa> (Minor issue)
[bookworm] - civetweb <no-dsa> (Minor issue)
https://github.com/krispybyte/CVE-2025-55763
https://github.com/civetweb/civetweb/pull/1347
https://github.com/civetweb/civetweb/issues/1348
Fixed by: https://github.com/civetweb/civetweb/commit/76e222bcb77ba8452e5da4e82ae6cecd499c25e0
Fixed by: https://github.com/civetweb/civetweb/commit/d5321963b1d0bc953101de91f8588bf83db73bf5