The following table lists the changes that have been made to the
CVE-2025-40911 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by 9b29abf9-4ab0-4765-b253-1875cd9b441eMay. 27, 2025
Action Type Old Value New Value Added Description Net::CIDR::Set versions 0.10 through 0.13 for Perl does not properly handle leading zero characters in IP CIDR address strings, which could allow attackers to bypass access control that is based on IP addresses. Leading zeros are used to indicate octal numbers, which can confuse users who are intentionally using octal notation, as well as users who believe they are using decimal notation.
Net::CIDR::Set used code from Net::CIDR::Lite, which had a similar vulnerability CVE-2021-47154.
Added CWE CWE-1287 Added Reference https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/ Added Reference https://github.com/robrwo/perl-Net-CIDR-Set/commit/be7d91e8446ad8013b08b4be313d666dab003a8a.patch Added Reference https://metacpan.org/release/RRWO/Net-CIDR-Set-0.14/changes