Web::Passwd versions through 0.03 for Perl is vulnerable to RCE. Web::Passwd is a small CGI application for managing htpasswd files using the htpasswd command. The user parameter is not validated or escaped, and is used as the last argument on the command line, allowing for command injection.
History

Thu, 14 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 14 May 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Evank
Evank web::passwd
Vendors & Products Evank
Evank web::passwd

Thu, 14 May 2026 02:30:00 +0000

Type Values Removed Values Added
References

Wed, 13 May 2026 22:45:00 +0000

Type Values Removed Values Added
Description Web::Passwd versions through 0.03 for Perl is vulnerable to RCE. Web::Passwd is a small CGI application for managing htpasswd files using the htpasswd command. The user parameter is not validated or escaped, and is used as the last argument on the command line, allowing for command injection.
Title Web::Passwd versions through 0.03 for Perl is vulnerable to RCE
Weaknesses CWE-78
References

cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-05-14T17:41:51.045Z

Reserved: 2026-05-13T20:31:51.641Z

Link: CVE-2026-8500

cve-icon Vulnrichment

Updated: 2026-05-14T00:35:26.211Z

cve-icon NVD

Status : Deferred

Published: 2026-05-13T23:16:43.237

Modified: 2026-05-14T18:16:51.490

Link: CVE-2026-8500

cve-icon Redhat

No data.