CVE-2025-53007

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-53007
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-53007.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-53007
Aliases
  • GHSA-5476-9jjq-563m
Published
2025-06-26T15:15:24Z
Modified
2025-06-27T11:13:55.700768Z
Summary
[none]
Details

arduino-esp32 provides an Arduino core for the ESP32. Versions prior to 3.3.0-RC1 and 3.2.1 contain a HTTP Response Splitting vulnerability. The sendHeader function takes arbitrary input for the HTTP header name and value, concatenates them into an HTTP header line, and appends this to the outgoing HTTP response headers. There is no validation or sanitization of the name or value parameters before they are included in the HTTP response. If an attacker can control the input to sendHeader (either directly or indirectly), they could inject carriage return (\r) or line feed (\n) characters into either the header name or value. This could allow the attacker to inject additional headers, manipulate the structure of the HTTP response, potentially inject an entire new HTTP response (HTTP Response Splitting), and/or ause header confusion or other HTTP protocol attacks. Versions 3.3.0-RC1 and 3.2.1 contain a fix for the issue.

References

Affected packages

Git / github.com/espressif/arduino-esp32

Affected ranges

Type
GIT
Repo
https://github.com/espressif/arduino-esp32
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.0.0
1.0.0-RC0
1.0.0-rc1
1.0.0-rc2
1.0.0-rc3
1.0.0-rc4
1.0.1
1.0.1-rc1
1.0.1-rc2
1.0.1-rc3
1.0.1-rc4
1.0.2
1.0.2-rc1
1.0.2-rc2
1.0.3
1.0.3-rc1
1.0.3-rc2
1.0.3-rc3
1.0.4
1.0.4-rc1
1.0.5
1.0.5-rc1
1.0.5-rc2
1.0.5-rc3
1.0.5-rc4
1.0.5-rc5
1.0.5-rc6
1.0.5-rc7
1.0.6

2.*

2.0.0
2.0.0-alpha1
2.0.0-rc1
2.0.0-rc2
2.0.1
2.0.1-RC1
2.0.2
2.0.3
2.0.3-RC1
2.0.4
2.0.5
2.0.6

3.*

3.0.0
3.0.0-alpha1
3.0.0-alpha2
3.0.0-alpha3
3.0.0-rc1
3.0.0-rc2
3.0.0-rc3
3.0.1
3.0.2
3.0.3
3.0.4
3.0.5
3.1.0
3.1.0-RC1
3.1.0-RC2
3.1.0-RC3
3.1.1
3.1.2
3.1.3
3.2.0
3.2.0-RC1
3.2.0-RC2