Search for vulnerabilities
Vulnerability details: VCID-csqc-3t7f-17er
Vulnerability ID VCID-csqc-3t7f-17er
Aliases CVE-2023-29197
GHSA-wxmh-65f7-jcvw
Summary guzzlehttp/psr7 is a PSR-7 HTTP message library implementation in PHP. Affected versions are subject to improper header parsing. An attacker could sneak in a newline (\n) into both the header names and values. While the specification states that \r\n\r\n is used to terminate the header list, many servers in the wild will also accept \n\n. This is a follow-up to CVE-2022-24775 where the fix was incomplete. The issue has been patched in versions 1.9.1 and 2.4.5. There are no known workarounds for this vulnerability. Users are advised to upgrade.
Status Published
Exploitability 0.5
Weighted Severity 6.8
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.0134 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.0134 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02291 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02291 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02291 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02291 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02291 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02291 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02291 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02291 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02483 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02483 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02483 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02483 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02483 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02483 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02483 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02483 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02483 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02483 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02483 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02483 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
epss 0.02483 https://api.first.org/data/v1/epss?cve=CVE-2023-29197
cvssv3.1 5.3 https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-24775
generic_textual MODERATE https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-24775
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-wxmh-65f7-jcvw
cvssv3.1 5.3 https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/psr7/CVE-2023-29197.yaml
generic_textual MODERATE https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/psr7/CVE-2023-29197.yaml
cvssv3.1 5.3 https://github.com/guzzle/psr7
generic_textual MODERATE https://github.com/guzzle/psr7
cvssv3.1 5.3 https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96
generic_textual MODERATE https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96
cvssv3.1 5.3 https://github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw
cvssv3.1_qr MODERATE https://github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw
generic_textual MODERATE https://github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw
cvssv3.1 5.3 https://lists.debian.org/debian-lts-announce/2023/12/msg00028.html
generic_textual MODERATE https://lists.debian.org/debian-lts-announce/2023/12/msg00028.html
cvssv3.1 5.3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJANWDXJZE5BGLN4MQ4FEHV5LJ6CMKQF
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJANWDXJZE5BGLN4MQ4FEHV5LJ6CMKQF
cvssv3.1 5.3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O35UN4IK6VS2LXSRWUDFWY7NI73RKY2U
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O35UN4IK6VS2LXSRWUDFWY7NI73RKY2U
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2023-29197
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2023-29197
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2023-29197
cvssv3.1 5.3 https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4
generic_textual MODERATE https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4
Reference id Reference type URL
https://api.first.org/data/v1/epss?cve=CVE-2023-29197
https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-24775
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29197
https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/psr7/CVE-2023-29197.yaml
https://github.com/guzzle/psr7
https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96
https://github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw
https://lists.debian.org/debian-lts-announce/2023/12/msg00028.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJANWDXJZE5BGLN4MQ4FEHV5LJ6CMKQF
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJANWDXJZE5BGLN4MQ4FEHV5LJ6CMKQF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O35UN4IK6VS2LXSRWUDFWY7NI73RKY2U
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O35UN4IK6VS2LXSRWUDFWY7NI73RKY2U/
https://nvd.nist.gov/vuln/detail/CVE-2023-29197
https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4
1034581 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034581
cpe:2.3:a:guzzlephp:psr-7:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:guzzlephp:psr-7:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
USN-6670-1 https://usn.ubuntu.com/6670-1/
USN-6671-1 https://usn.ubuntu.com/6671-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-24775
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/psr7/CVE-2023-29197.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/guzzle/psr7
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/guzzle/psr7/security/advisories/GHSA-wxmh-65f7-jcvw
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://lists.debian.org/debian-lts-announce/2023/12/msg00028.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJANWDXJZE5BGLN4MQ4FEHV5LJ6CMKQF
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O35UN4IK6VS2LXSRWUDFWY7NI73RKY2U
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-29197
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-29197
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://www.rfc-editor.org/rfc/rfc7230#section-3.2.4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.79271
EPSS Score 0.0134
Published At Aug. 3, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:37:19.995354+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/6671-1/ 37.0.0