Vulnerability Description
Rack is a modular Ruby web server interface. The Rack::Sendfile middleware logs unsanitised header values from the X-Sendfile-Type header. An attacker can exploit this by injecting escape sequences (such as newline characters) into the header, resulting in log injection. This vulnerability is fixed in 2.2.12, 3.0.13, and 3.1.11.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rack | Rack | < 2.2.12 |
Related Weaknesses (CWE)
References
- https://github.com/rack/rack/commit/803aa221e8302719715e224f4476e438f2531a53Patch
- https://github.com/rack/rack/commit/aeac570bb8080ca7b53b7f2e2f67498be7ebd30bPatch
- https://github.com/rack/rack/commit/b13bc6bfc7506aca3478dc5ac1c2ec6fc53f82a3Patch
- https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6vMitigationVendor Advisory
- https://lists.debian.org/debian-lts-announce/2025/03/msg00016.html
FAQ
What is CVE-2025-27111?
CVE-2025-27111 is a vulnerability with a CVSS score of 7.5 (HIGH). Rack is a modular Ruby web server interface. The Rack::Sendfile middleware logs unsanitised header values from the X-Sendfile-Type header. An attacker can exploit this by injecting escape sequences (s...
How severe is CVE-2025-27111?
CVE-2025-27111 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-27111?
Check the references section above for vendor advisories and patch information. Affected products include: Rack Rack.