Description
Net::CIDR::Lite versions before 0.24 for Perl does not properly consider extraneous zero characters in CIDR mask values, which may allow IP ACL bypass.

Mask forms like "/00" and "/01" pass validation and parse to the same prefix as their unpadded value.

See also CVE-2026-45190.
Published: 2026-05-10
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Net::CIDR::Lite versions older than 0.24 fail to strip or otherwise handle arbitrary leading zeros in CIDR mask values. Mask forms such as "/00" or "/01" are accepted by the parser and are interpreted as having the same prefix length as their unpadded counterparts. This flaw permits an attacker to supply an IP address with a CIDR mask containing leading zeros that is treated as a valid, shorter prefix, effectively expanding a blocked range to a wider one and allowing traffic that should be blocked to pass through. The flaw is an input validation issue (CWE‑1289).

Affected Systems

Vendor STIGTSP – Net::CIDR::Lite, affected releases are all versions prior to 0.24 for Perl (0.23 and earlier).

Risk and Exploitability

The vulnerability can be exploited by any software that imports and uses Net::CIDR::Lite to enforce IP-based access control. An attacker who can influence the arguments passed to the module—such as by supplying a crafted CIDR block through a network service, configuration file or user input—can create a prefix that appears to match a forbidden address range but actually covers a broader set of IPs. Because the module is a pure Perl library, the attack can be carried out remotely over any interface that accepts IP or CIDR values, or locally by modifying configuration files. No EPSS score was reported and the vulnerability is not listed in the CISA KEV catalogue, but the impact of bypassing network ACLs is significant, so the risk is considered high to critical when the application relies heavily on IP filtering.

Generated by OpenCVE AI on May 10, 2026 at 21:20 UTC.

Remediation

Vendor Solution

Upgrade to version 0.24 or newer, or apply the patch provided.


OpenCVE Recommended Actions

  • Upgrade Net::CIDR::Lite to version 0.24 or newer.
  • Apply the provided patch from the plugin commit if the upgrade is not possible.
  • Audit application code to ensure no external IP inputs are processed through vulnerable Net::CIDR::Lite functions, and sanitize or reject inputs containing leading zero characters in CIDR masks.

Generated by OpenCVE AI on May 10, 2026 at 21:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 10 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Stigtsp
Stigtsp net::cidr::lite
Vendors & Products Stigtsp
Stigtsp net::cidr::lite

Sun, 10 May 2026 20:30:00 +0000

Type Values Removed Values Added
Description Net::CIDR::Lite versions before 0.24 for Perl does not properly consider extraneous zero characters in CIDR mask values, which may allow IP ACL bypass. Mask forms like "/00" and "/01" pass validation and parse to the same prefix as their unpadded value. See also CVE-2026-45190.
Title Net::CIDR::Lite versions before 0.24 for Perl does not properly consider extraneous zero characters in CIDR mask values, which may allow IP ACL bypass
Weaknesses CWE-1289
References

Subscriptions

Stigtsp Net::cidr::lite
cve-icon MITRE

Status: PUBLISHED

Assigner: CPANSec

Published:

Updated: 2026-05-10T20:15:53.897Z

Reserved: 2026-05-10T16:36:05.708Z

Link: CVE-2026-45191

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-10T21:16:29.380

Modified: 2026-05-10T21:16:29.380

Link: CVE-2026-45191

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-10T21:30:20Z

Weaknesses