BlackSheep is an asynchronous web framework to build event based web applications with Python. Prior to 2.4.6, the HTTP Client implementation in BlackSheep is vulnerable to CRLF injection. Missing headers validation makes it possible for an attacker to modify the HTTP requests (e.g. insert a new header) or even create a new HTTP request. Exploitation requires developers to pass unsanitized user input directly into headers.The server part is not affected because BlackSheep delegates to an underlying ASGI server handling of response headers. This vulnerability is fixed in 2.4.6.
History

Wed, 14 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
Description BlackSheep is an asynchronous web framework to build event based web applications with Python. Prior to 2.4.6, the HTTP Client implementation in BlackSheep is vulnerable to CRLF injection. Missing headers validation makes it possible for an attacker to modify the HTTP requests (e.g. insert a new header) or even create a new HTTP request. Exploitation requires developers to pass unsanitized user input directly into headers.The server part is not affected because BlackSheep delegates to an underlying ASGI server handling of response headers. This vulnerability is fixed in 2.4.6.
Title BlackSheep ClientSession is vulnerable to CRLF injection
Weaknesses CWE-113
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-14T16:49:34.202Z

Reserved: 2026-01-09T18:27:19.388Z

Link: CVE-2026-22779

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-14T17:16:09.150

Modified: 2026-01-14T17:16:09.150

Link: CVE-2026-22779

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.