guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds.

Project Subscriptions

Vendors Products
Guzzlephp Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3705-1 php-guzzlehttp-psr7 security update
EUVD EUVD EUVD-2022-1513 guzzlehttp/psr7 is a PSR-7 HTTP message library. Versions prior to 1.8.4 and 2.1.1 are vulnerable to improper header parsing. An attacker could sneak in a new line character and pass untrusted values. The issue is patched in 1.8.4 and 2.1.1. There are currently no known workarounds.
Github GHSA Github GHSA GHSA-q7rv-6hp3-vh96 Improper Input Validation in guzzlehttp/psr7
Ubuntu USN Ubuntu USN USN-6670-1 php-guzzlehttp-psr7 vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 23 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-23T18:45:20.759Z

Reserved: 2022-02-10T00:00:00.000Z

Link: CVE-2022-24775

cve-icon Vulnrichment

Updated: 2024-08-03T04:20:50.472Z

cve-icon NVD

Status : Modified

Published: 2022-03-21T19:15:11.677

Modified: 2024-11-21T06:51:04.337

Link: CVE-2022-24775

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses