Improper header parsing. An attacker could sneak in a carriage return character (\r) and pass untrusted values in both the header names and values.
The issue is patched in 1.8.4 and 2.1.1.
There are no known workarounds.
{
"nvd_published_at": "2022-03-21T19:15:00Z",
"github_reviewed_at": "2022-03-25T19:26:33Z",
"cwe_ids": [
"CWE-20"
],
"severity": "MODERATE",
"github_reviewed": true
}