๐Ÿ” CVE Alert

CVE-2025-52479

UNKNOWN 0.0

HTTP.jl vulnerable to CR/LF Injection in URIs

CVSS Score
0.0
EPSS Score
0.4%
EPSS Percentile
57th

HTTP.jl provides HTTP client and server functionality for Julia, and URIs.jl parses and works with Uniform Resource Identifiers (URIs). URIs.jl prior to version 1.6.0 and HTTP.jl prior to version 1.10.17 allows the construction of URIs containing CR/LF characters. If user input was not otherwise escaped or protected, this can lead to a CRLF injection attack. Users of HTTP.jl should upgrade immediately to HTTP.jl v1.10.17, and users of URIs.jl should upgrade immediately to URIs.jl v1.6.0. The check for valid URIs is now in the URI.jl package, and the latest version of HTTP.jl incorporates that fix. As a workaround, manually validate any URIs before passing them on to functions in this package.

CWE CWE-93 CWE-113
Vendor juliaweb
Product http.jl
Published Jun 25, 2025
Last Updated May 7, 2026
Stay Ahead of the Next One

Get instant alerts for juliaweb http.jl

Be the first to know when new unknown vulnerabilities affecting juliaweb http.jl are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

JuliaWeb / HTTP.jl
< 1.10.17

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/JuliaWeb/HTTP.jl/security/advisories/GHSA-4g68-4pxg-mw93 github.com: https://github.com/JuliaWeb/URIs.jl/pull/66 github.com: https://github.com/JuliaWeb/HTTP.jl/commit/e124953f388e7750f893fcf90efc72b7a59e35eb