CVE-2025-60876

Publication date 10 November 2025

Last updated 16 February 2026


Ubuntu priority

Cvss 3 Severity Score

6.5 · Medium

Score breakdown

Description

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).

Read the notes from the security team

Status

Package Ubuntu Release Status
busybox 25.10 questing
Vulnerable
25.04 plucky Ignored end of life, was deferred [2026-01-15]
24.04 LTS noble
Vulnerable
22.04 LTS jammy
Vulnerable
20.04 LTS focal
Vulnerable
18.04 LTS bionic
Vulnerable
16.04 LTS xenial
Vulnerable
14.04 LTS trusty
Vulnerable

Notes


mdeslaur

as of 2026-02-16, there is no fix from upstream for this issue but Debian has added proposed fixes to 1:1.37.0-10

Severity score breakdown

Parameter Value
Base score 6.5 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality Low
Integrity impact Low
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N