CodeIgniter is a PHP full-stack web framework. Prior to 4.5.8, CodeIgniter lacked proper header validation for its name and value. The potential attacker can construct deliberately malformed headers with Header class. This could disrupt application functionality, potentially causing errors or generating invalid HTTP requests. In some cases, these malformed requests might lead to a DoS scenario if a remote service’s web application firewall interprets them as malicious and blocks further communication with the application. This vulnerability is fixed in 4.5.8.
Metrics
Affected Vendors & Products
References
History
Tue, 21 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 20 Jan 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | CodeIgniter is a PHP full-stack web framework. Prior to 4.5.8, CodeIgniter lacked proper header validation for its name and value. The potential attacker can construct deliberately malformed headers with Header class. This could disrupt application functionality, potentially causing errors or generating invalid HTTP requests. In some cases, these malformed requests might lead to a DoS scenario if a remote service’s web application firewall interprets them as malicious and blocks further communication with the application. This vulnerability is fixed in 4.5.8. | |
Title | CodeIgniter validation of header name and value | |
Weaknesses | CWE-436 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-01-20T15:57:37.975Z
Updated: 2025-01-21T14:51:01.754Z
Reserved: 2025-01-16T17:31:06.458Z
Link: CVE-2025-24013

Updated: 2025-01-21T14:50:57.893Z

Status : Received
Published: 2025-01-20T16:15:28.877
Modified: 2025-01-20T16:15:28.877
Link: CVE-2025-24013

No data.