Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22779: CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') in Neoteroi BlackSheep

0
Medium
VulnerabilityCVE-2026-22779cvecve-2026-22779cwe-113
Published: Wed Jan 14 2026 (01/14/2026, 16:49:34 UTC)
Source: CVE Database V5
Vendor/Project: Neoteroi
Product: BlackSheep

Description

CVE-2026-22779 is a medium-severity vulnerability in the BlackSheep Python asynchronous web framework's HTTP Client prior to version 2. 4. 6. It involves improper neutralization of CRLF sequences in HTTP headers, enabling HTTP request/response splitting attacks. This flaw allows attackers to inject malicious headers or craft new HTTP requests if developers pass unsanitized user input into headers. The server-side response handling is not affected due to delegation to ASGI servers. Exploitation does not require authentication or user interaction but does require the vulnerable client code to incorporate unsafe input. The vulnerability is fixed in BlackSheep version 2. 4. 6.

AI-Powered Analysis

AILast updated: 01/14/2026, 19:09:47 UTC

Technical Analysis

CVE-2026-22779 identifies a vulnerability classified under CWE-113, relating to improper neutralization of CRLF sequences within HTTP headers in the BlackSheep asynchronous web framework's HTTP Client implementation. BlackSheep is designed for building event-driven web applications in Python. Prior to version 2.4.6, the HTTP Client component fails to validate or sanitize header inputs properly, allowing attackers to inject carriage return and line feed characters (CRLF) into HTTP headers. This injection can manipulate the HTTP request structure, enabling HTTP request/response splitting attacks. Such attacks can lead to header injection, cache poisoning, cross-site scripting (XSS), or web cache deception attacks by inserting malicious headers or crafting new HTTP requests. The vulnerability requires that developers pass unsanitized user input directly into HTTP headers, meaning exploitation depends on insecure coding practices. The server-side response handling is unaffected because BlackSheep delegates response header processing to an underlying ASGI server, which properly handles header sanitization. The vulnerability has a CVSS 4.0 base score of 6.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, but partial impact on system integrity and confidentiality. The issue was publicly disclosed on January 14, 2026, and fixed in version 2.4.6 of BlackSheep. No known exploits have been reported in the wild to date.

Potential Impact

For European organizations using BlackSheep versions prior to 2.4.6, this vulnerability poses a risk of HTTP request/response splitting attacks, which can undermine web application security. Potential impacts include unauthorized header injection, leading to session fixation, cache poisoning, cross-site scripting, or redirect attacks. These can compromise confidentiality and integrity of user data, degrade trust in web services, and facilitate further exploitation such as phishing or credential theft. Organizations relying on BlackSheep for internal or customer-facing applications may experience data leakage or manipulation. The vulnerability does not affect server response headers, limiting some attack vectors, but the client-side HTTP request manipulation can still be leveraged in complex attack chains. Given that exploitation requires unsafe coding practices (passing unsanitized input into headers), the risk is higher in custom or less mature applications. The medium severity score indicates a moderate but actionable threat. European entities in sectors like finance, healthcare, or government using BlackSheep-based applications should be particularly vigilant due to the sensitivity of their data and regulatory requirements such as GDPR.

Mitigation Recommendations

European organizations should immediately upgrade all BlackSheep HTTP Client implementations to version 2.4.6 or later to remediate this vulnerability. Developers must audit their codebases to ensure no unsanitized user input is passed directly into HTTP headers. Implement strict input validation and sanitization routines for all header values, explicitly removing or encoding CRLF characters. Employ security code reviews and automated static analysis tools to detect unsafe header manipulations. Where possible, use higher-level abstractions or libraries that enforce header safety. Additionally, monitor web application logs for anomalous HTTP header patterns indicative of injection attempts. Incorporate web application firewalls (WAFs) configured to detect and block CRLF injection and HTTP request splitting attacks. Educate development teams on secure coding practices related to HTTP header handling. Finally, maintain an inventory of applications using BlackSheep to prioritize patching and risk assessment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-09T18:27:19.388Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6967e9c5f809b25a98cd9f44

Added to database: 1/14/2026, 7:08:53 PM

Last enriched: 1/14/2026, 7:09:47 PM

Last updated: 1/14/2026, 8:44:04 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats