๐Ÿ” CVE Alert

CVE-2026-27613

UNKNOWN 0.0

CGI Parameter Injection (Bypass of STRICT_CGI_PARAMS and EscapeShellParam)

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. A vulnerability in versions prior to 2.01 allows unauthenticated remote attackers to bypass the web server's CGI parameter security controls. Depending on the server configuration and the specific CGI executable in use, the impact is either source code disclosure or remote code execution (RCE). Anyone hosting CGI scripts (particularly interpreted languages like PHP) using vulnerable versions of TinyWeb is impacted. The problem has been patched in version 2.01. If upgrading is not immediately possible, ensure `STRICT_CGI_PARAMS` is enabled (it is defined by default in `define.inc`) and/or do not use CGI executables that natively accept dangerous command-line flags (such as `php-cgi.exe`). If hosting PHP, consider placing the server behind a Web Application Firewall (WAF) that explicitly blocks URL query string parameters that begin with a hyphen (`-`) or contain encoded double quotes (`%22`).

CWE CWE-78 CWE-88
Vendor maximmasiutin
Product tinyweb
Published Feb 25, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for maximmasiutin tinyweb

Be the first to know when new unknown vulnerabilities affecting maximmasiutin tinyweb are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

maximmasiutin / TinyWeb
< 2.01

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/maximmasiutin/TinyWeb/security/advisories/GHSA-rfx5-fh9m-9jj9 github.com: https://github.com/maximmasiutin/TinyWeb/commit/d9dbda8db49da69d2160e1c527e782b73b5ffb6b github.com: https://github.com/maximmasiutin/TinyWeb/releases/tag/v2.01 masiutin.net: https://www.masiutin.net/tinyweb-cve-2026-27613.html