๐Ÿ” CVE Alert

CVE-2026-45190

MEDIUM 6.5

Net::CIDR::Lite versions before 0.24 for Perl does not properly validate IP address and CIDR mask inputs, which may allow IP ACL bypass

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
10th

Net::CIDR::Lite versions before 0.24 for Perl does not properly validate IP address and CIDR mask inputs, which may allow IP ACL bypass. Inputs containing a trailing newline or non-ASCII digit characters pass the validators but are then re-encoded by the parser to a different address than the input string spelled. find() and bin_find() can match or miss addresses as a result. Example: my $cidr = Net::CIDR::Lite->new(); $cidr->add("::1\n/128"); $cidr->find("::1a"); # incorrectly returns true See also CVE-2026-45191.

CWE CWE-1289
Vendor stigtsp
Product net::cidr::lite
Published May 10, 2026
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for stigtsp net::cidr::lite

Be the first to know when new medium vulnerabilities affecting stigtsp net::cidr::lite are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

STIGTSP / Net::CIDR::Lite
0 < 0.24

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/stigtsp/Net-CIDR-Lite/commit/ca9542adec87110556601d7ce48381ea8d13e692.patch metacpan.org: https://metacpan.org/release/STIGTSP/Net-CIDR-Lite-0.24/changes cve.org: https://www.cve.org/CVERecord?id=CVE-2026-45191