Vulnerability Description
Web::Passwd versions through 0.03 for Perl is vulnerable to RCE. Web::Passwd is a small CGI application for managing htpasswd files using the htpasswd command. The user parameter is not validated or escaped, and is used as the last argument on the command line, allowing for command injection.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://httpd.apache.org/docs/current/programs/htpasswd.html
- https://metacpan.org/release/EVANK/Web-Passwd-0.03
- http://www.openwall.com/lists/oss-security/2026/05/13/8
FAQ
What is CVE-2026-8500?
CVE-2026-8500 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Web::Passwd versions through 0.03 for Perl is vulnerable to RCE. Web::Passwd is a small CGI application for managing htpasswd files using the htpasswd command. The user parameter is not validated or...
How severe is CVE-2026-8500?
CVE-2026-8500 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-8500?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.