CVE-2025-40907: FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library
Stig Palmquist 16 May 2025 13:04 UTC
========================================================================
CVE-2025-40907 CPAN Security Group
========================================================================
CVE ID: CVE-2025-40907
Distribution: FCGI
Versions: from 0.44 through 0.82
MetaCPAN: https://metacpan.org/dist/FCGI
VCS Repo: https://github.com/FastCGI-Archives/fcgi2
FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version
of the FastCGI fcgi2 (aka fcgi) library
Description
-----------
FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version
of the FastCGI fcgi2 (aka fcgi) library.
The included FastCGI library is affected by CVE-2025-23016, causing an
integer overflow (and resultant heap-based buffer overflow) via crafted
nameLen or valueLen values in data to the IPC socket. This occurs in
ReadParams in fcgiapp.c.
Problem types
-------------
CWE-1395: Dependency on Vulnerable Third-Party Component
Workarounds
-----------
Updating to version 2.4.5 of the included fcgi2 library and rebuilding
the Perl module will protect against the vulnerability.
We also recommend limiting potential remote access to the FastCGI
socket by declaring it as a UNIX socket.
References
----------
http://www.openwall.com/lists/oss-security/2025/04/23/4
https://github.com/FastCGI-Archives/fcgi2/issues/67
https://github.com/FastCGI-Archives/fcgi2/releases/tag/2.4.5
https://www.synacktiv.com/en/publications/cve-2025-23016-exploiting-the-fastcgi-library
https://github.com/perl-catalyst/FCGI/issues/14
https://patch-diff.githubusercontent.com/raw/FastCGI-Archives/fcgi2/pull/74.patch
Credits
-------
Synacktiv, finder