CVE-2026-22779 is a medium severity vulnerability with a CVSS score of 5.3. No known exploits currently, and patches are available.
Very low probability of exploitation
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
The HTTP Client implementation in BlackSheep is vulnerable to CRLF injection. Missing headers validation makes it possible for an attacker to modify the HTTP requests (e.g. insert a new header) or even create a new HTTP request. Exploitation requires developers to pass unsanitized user input directly into headers. The server part is not affected because BlackSheep delegates to an underlying ASGI server handling of response headers.
Attack vector: Applications using user input in HTTP client requests (method, URL, headers).
Users who use the HTTP Client in BlackSheep should upgrade to 2.4.6.
If users handle headers from untrusted parties, they might reject values for header names and values that contain carriage returns.
https://owasp.org/www-community/vulnerabilities/CRLF_Injection
| Vendor | Product |
|---|---|
| Neoteroi | Blacksheep |
Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.