CVE-2025-40911 – Apache Net::CIDR::Set IP CIDR Leading Zero Vulnerability

The following table lists the changes that have been made to the
CVE-2025-40911 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by 9b29abf9-4ab0-4765-b253-1875cd9b441e

    May. 27, 2025

    Action Type Old Value New Value
    Added Description Net::CIDR::Set versions 0.10 through 0.13 for Perl does not properly handle leading zero characters in IP CIDR address strings, which could allow attackers to bypass access control that is based on IP addresses.

    Leading zeros are used to indicate octal numbers, which can confuse users who are intentionally using octal notation, as well as users who believe they are using decimal notation.

    Net::CIDR::Set used code from Net::CIDR::Lite, which had a similar vulnerability CVE-2021-47154.

    Added CWE CWE-1287
    Added Reference https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/
    Added Reference https://github.com/robrwo/perl-Net-CIDR-Set/commit/be7d91e8446ad8013b08b4be313d666dab003a8a.patch
    Added Reference https://metacpan.org/release/RRWO/Net-CIDR-Set-0.14/changes
Share the Post:

Related Posts