Vulnerability Description
HTTP.jl is an HTTP client and server functionality for the Julia programming language. Prior to version 1.10.19, HTTP.jl did not validate header names/values for illegal characters, allowing CRLF-based header injection and response splitting. This enables HTTP response splitting and header injection, leading to cache poisoning, XSS, session fixation, and more. This issue is fixed in HTTP.jl `v1.10.19`.
Related Weaknesses (CWE)
References
- https://github.com/JuliaWeb/HTTP.jl/releases/tag/v1.10.19
- https://github.com/JuliaWeb/HTTP.jl/security/advisories/GHSA-h3x8-ppwj-6vcj
FAQ
What is CVE-2025-61689?
CVE-2025-61689 is a documented vulnerability. HTTP.jl is an HTTP client and server functionality for the Julia programming language. Prior to version 1.10.19, HTTP.jl did not validate header names/values for illegal characters, allowing CRLF-base...
How severe is CVE-2025-61689?
CVSS scoring is not yet available for CVE-2025-61689. Check NVD for updates.
Is there a patch for CVE-2025-61689?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.