CVE-2026-22779: BlackSheep's ClientSession is vulnerable to CRLF injection
The HTTP Client implementation in BlackSheep is vulnerable to CRLF injection. Missing headers validation makes it possible for an attacker to modify the HTTP requests (e.g. insert a new header) or even create a new HTTP request. Exploitation requires developers to pass unsanitized user input directly into headers. The server part is not affected because BlackSheep delegates to an underlying ASGI server handling of response headers.
Attack vector: Applications using user input in HTTP client requests (method, URL, headers).
References
- github.com/Neoteroi/BlackSheep
- github.com/Neoteroi/BlackSheep/commit/bd4ecb9542b5d52442276b5a6907931b90f38d12
- github.com/Neoteroi/BlackSheep/releases/tag/v2.4.6
- github.com/Neoteroi/BlackSheep/security/advisories/GHSA-6pw3-h7xf-x4gp
- github.com/advisories/GHSA-6pw3-h7xf-x4gp
- nvd.nist.gov/vuln/detail/CVE-2026-22779
Code Behaviors & Features
Detect and mitigate CVE-2026-22779 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →