Description
TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. A vulnerability in versions prior to 2.01 allows unauthenticated remote attackers to bypass the web server's CGI parameter security controls. Depending on the server configuration and the specific CGI executable in use, the impact is either source code disclosure or remote code execution (RCE). Anyone hosting CGI scripts (particularly interpreted languages like PHP) using vulnerable versions of TinyWeb is impacted. The problem has been patched in version 2.01. If upgrading is not immediately possible, ensure `STRICT_CGI_PARAMS` is enabled (it is defined by default in `define.inc`) and/or do not use CGI executables that natively accept dangerous command-line flags (such as `php-cgi.exe`). If hosting PHP, consider placing the server behind a Web Application Firewall (WAF) that explicitly blocks URL query string parameters that begin with a hyphen (`-`) or contain encoded double quotes (`%22`).
Published: 2026-02-25
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution or source code disclosure via CGI parameter bypass
Action: Immediate Patch
AI Analysis

Impact

A flaw in TinyWeb before version 2.01 allows an unauthenticated attacker to bypass the server’s CGI parameter filtering, enabling the injection of arbitrary command-line arguments or credentials. Depending on the CGI executable used and the server configuration, the attacker may obtain source code or execute arbitrary commands on the host system. The vulnerability arises from missing validation of CGI parameters, in particular the inability to enforce STRICT_CGI_PARAMS and improper handling of EscapeShellParam escaping.

Affected Systems

All installations of TinyWeb by Maxim Masutin (RITLabs) running versions earlier than 2.01 are affected. The problem was resolved in release 2.01. Users running a web server that hosts CGI scripts—especially interpreted languages such as PHP—are at risk.

Risk and Exploitability

The CVSS score of 10 indicates the highest severity. The EPSS score of less than 1% suggests a very low probability of exploitation in the wild, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires only an HTTP request containing specially crafted CGI parameters; an attacker does not need authentication or elevated privileges. The attack surface is remote and can target any accessible TinyWeb instance vulnerable to this bypass.

Generated by OpenCVE AI on April 17, 2026 at 14:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to TinyWeb version 2.01 or later to apply the vendor patch.
  • Recompile the server with the STRICT_CGI_PARAMS define enabled, which is the default in define.inc.
  • Remove or replace CGI executables that accept dangerous command‑line flags such as php‑cgi.exe, or reconfigure them to reject such parameters.
  • Deploy a Web Application Firewall that blocks URL query string parameters that start with a hyphen or contain encoded double quotes (%22).

Generated by OpenCVE AI on April 17, 2026 at 14:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Mar 2026 03:30:00 +0000

Type Values Removed Values Added
First Time appeared Ritlabs
Ritlabs tinyweb
CPEs cpe:2.3:a:ritlabs:tinyweb:*:*:*:*:*:*:*:*
Vendors & Products Ritlabs
Ritlabs tinyweb
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Maximmasiutin
Maximmasiutin tinyweb
Vendors & Products Maximmasiutin
Maximmasiutin tinyweb

Wed, 25 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. A vulnerability in versions prior to 2.01 allows unauthenticated remote attackers to bypass the web server's CGI parameter security controls. Depending on the server configuration and the specific CGI executable in use, the impact is either source code disclosure or remote code execution (RCE). Anyone hosting CGI scripts (particularly interpreted languages like PHP) using vulnerable versions of TinyWeb is impacted. The problem has been patched in version 2.01. If upgrading is not immediately possible, ensure `STRICT_CGI_PARAMS` is enabled (it is defined by default in `define.inc`) and/or do not use CGI executables that natively accept dangerous command-line flags (such as `php-cgi.exe`). If hosting PHP, consider placing the server behind a Web Application Firewall (WAF) that explicitly blocks URL query string parameters that begin with a hyphen (`-`) or contain encoded double quotes (`%22`).
Title CGI Parameter Injection (Bypass of STRICT_CGI_PARAMS and EscapeShellParam)
Weaknesses CWE-78
CWE-88
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

Maximmasiutin Tinyweb
Ritlabs Tinyweb
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-26T20:22:22.813Z

Reserved: 2026-02-20T19:43:14.602Z

Link: CVE-2026-27613

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T23:16:21.743

Modified: 2026-03-04T03:21:58.263

Link: CVE-2026-27613

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:45:21Z

Weaknesses