CVE-2026-5140
CRLF Injection in Pardus Allows Authentication Bypass
Publication date: 2026-04-29
Last updated on: 2026-05-04
Assigner: Computer Emergency Response Team of the Republic of Turkey
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tubitak_bilgem | pardus | From 0.6.4 (inc) to 0.8.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-93 | The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an improper neutralization of CRLF sequences, also known as CRLF injection, in the Pardus software developed by TUBITAK BILGEM Software Technologies Research Institute. It allows an attacker to bypass authentication mechanisms.
How can this vulnerability impact me? :
The vulnerability can have a severe impact as it allows an attacker to bypass authentication, potentially gaining unauthorized access to the system. The CVSS score of 9.6 indicates high severity with impacts on confidentiality, integrity, and availability.
Can you explain this vulnerability to me?
This vulnerability is an improper neutralization of CRLF sequences, also known as CRLF injection, in the Pardus software developed by TUBITAK BILGEM Software Technologies Research Institute. It allows an attacker to bypass authentication mechanisms.
How can this vulnerability impact me? :
The vulnerability can lead to an authentication bypass, which means an attacker could potentially gain unauthorized access to the system. This can result in a high impact on confidentiality, integrity, and availability of the affected system.