Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27613: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in maximmasiutin TinyWeb

0
Critical
VulnerabilityCVE-2026-27613cvecve-2026-27613cwe-78cwe-88
Published: Wed Feb 25 2026 (02/25/2026, 22:58:16 UTC)
Source: CVE Database V5
Vendor/Project: maximmasiutin
Product: TinyWeb

Description

TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. A vulnerability in versions prior to 2.01 allows unauthenticated remote attackers to bypass the web server's CGI parameter security controls. Depending on the server configuration and the specific CGI executable in use, the impact is either source code disclosure or remote code execution (RCE). Anyone hosting CGI scripts (particularly interpreted languages like PHP) using vulnerable versions of TinyWeb is impacted. The problem has been patched in version 2.01. If upgrading is not immediately possible, ensure `STRICT_CGI_PARAMS` is enabled (it is defined by default in `define.inc`) and/or do not use CGI executables that natively accept dangerous command-line flags (such as `php-cgi.exe`). If hosting PHP, consider placing the server behind a Web Application Firewall (WAF) that explicitly blocks URL query string parameters that begin with a hyphen (`-`) or contain encoded double quotes (`%22`).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 10:01:25 UTC

Technical Analysis

CVE-2026-27613 is an OS command injection vulnerability identified in TinyWeb, a lightweight web server written in Delphi for Win32 platforms. This vulnerability affects all versions prior to 2.01 and arises from improper neutralization of special elements used in OS commands (CWE-78) combined with insufficient CGI parameter validation (CWE-88). Specifically, unauthenticated remote attackers can bypass the web server's CGI parameter security controls, allowing them to inject malicious commands through crafted HTTP requests. The impact varies based on the server's CGI configuration: it can lead to disclosure of source code or full remote code execution (RCE). Servers hosting CGI scripts, particularly those running interpreted languages like PHP via executables such as php-cgi.exe, are at heightened risk because these executables accept command-line flags that can be exploited. The vulnerability is exploitable over the network without authentication or user interaction, making it highly dangerous. The vendor has released version 2.01 to patch this issue. In the interim, enabling the STRICT_CGI_PARAMS directive (enabled by default in define.inc) can help restrict dangerous parameters. Additionally, administrators are advised to avoid using CGI executables that accept risky command-line flags and to deploy Web Application Firewalls (WAFs) configured to block query parameters starting with hyphens or containing encoded double quotes (%22), which are commonly used in exploitation attempts.

Potential Impact

The vulnerability poses a severe risk to organizations worldwide running vulnerable versions of TinyWeb, especially those hosting CGI scripts with interpreted languages like PHP. Successful exploitation can lead to unauthorized disclosure of sensitive source code, exposing intellectual property and potentially revealing further vulnerabilities. More critically, it can enable remote code execution, allowing attackers to execute arbitrary commands on the server with the privileges of the web server process. This can lead to full system compromise, data theft, service disruption, or use of the server as a pivot point for lateral movement within an organization’s network. Given the vulnerability requires no authentication or user interaction and is exploitable remotely, the attack surface is broad. Organizations relying on TinyWeb in production environments, particularly in sectors where web servers host critical applications or sensitive data, face significant operational and reputational risks. The critical CVSS score of 10 underscores the urgency of remediation.

Mitigation Recommendations

1. Upgrade TinyWeb to version 2.01 or later immediately to apply the official patch addressing this vulnerability. 2. If immediate upgrade is not feasible, ensure the STRICT_CGI_PARAMS directive is enabled in the server configuration (it is enabled by default in define.inc) to enforce stricter validation of CGI parameters. 3. Avoid using CGI executables that accept dangerous command-line flags, such as php-cgi.exe, or replace them with safer alternatives that do not expose such attack vectors. 4. Deploy a Web Application Firewall (WAF) in front of the TinyWeb server configured to block URL query string parameters that begin with a hyphen (-) or contain encoded double quotes (%22), as these are commonly used in exploitation attempts. 5. Conduct thorough auditing and monitoring of web server logs for suspicious CGI parameter usage or unusual command-line flags. 6. Restrict permissions of the web server process to the minimum necessary to limit potential damage from exploitation. 7. Regularly review and update server configurations and security policies to incorporate emerging threat intelligence related to CGI and web server vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T19:43:14.602Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f81a4b7ef31ef0b675cc0

Added to database: 2/25/2026, 11:11:32 PM

Last enriched: 3/5/2026, 10:01:25 AM

Last updated: 4/12/2026, 7:58:08 AM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses