CVE-2025-27111
Severity CVSS v4.0:
MEDIUM
Type:
CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')
Publication date:
04/03/2025
Last modified:
03/11/2025
Description
Rack is a modular Ruby web server interface. The Rack::Sendfile middleware logs unsanitised header values from the X-Sendfile-Type header. An attacker can exploit this by injecting escape sequences (such as newline characters) into the header, resulting in log injection. This vulnerability is fixed in 2.2.12, 3.0.13, and 3.1.11.
Impact
Base Score 4.0
6.90
Severity 4.0
MEDIUM
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:* | 2.2.12 (excluding) | |
| cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:* | 3.0.0 (including) | 3.0.13 (excluding) |
| cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:* | 3.1.0 (including) | 3.1.11 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/rack/rack/commit/803aa221e8302719715e224f4476e438f2531a53
- https://github.com/rack/rack/commit/aeac570bb8080ca7b53b7f2e2f67498be7ebd30b
- https://github.com/rack/rack/commit/b13bc6bfc7506aca3478dc5ac1c2ec6fc53f82a3
- https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v
- https://lists.debian.org/debian-lts-announce/2025/03/msg00016.html



