embedthis CVE Vulnerabilities & Metrics

Focus on embedthis vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About embedthis Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with embedthis. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total embedthis CVEs: 22
Earliest CVE date: 31 Mar 2015, 14:59 UTC
Latest CVE date: 08 Aug 2022, 19:15 UTC

Latest CVE reference: CVE-2021-41615

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical embedthis CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.65

Max CVSS: 9.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 1
4.0-6.9 16
7.0-8.9 4
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS embedthis CVEs

These are the five CVEs with the highest CVSS scores for embedthis, sorted by severity first and recency.

All CVEs for embedthis

CVE-2021-41615 embedthis vulnerability CVSS: 0 08 Aug 2022, 19:15 UTC

websda.c in GoAhead WebServer 2.1.8 has insufficient nonce entropy because the nonce calculation relies on the hardcoded onceuponatimeinparadise value, which does not follow the secret-data guideline for HTTP Digest Access Authentication in RFC 7616 section 3.3 (or RFC 2617 section 3.2.1). NOTE: 2.1.8 is a version from 2003; however, the affected websda.c code appears in multiple derivative works that may be used in 2021. Recent GoAhead software is unaffected.

CVE-2021-33254 embedthis vulnerability CVSS: 5.0 02 Jun 2022, 14:15 UTC

An issue was discovered in src/http/httpLib.c in EmbedThis Appweb Community Edition 8.2.1, allows attackers to cause a denial of service via the stream paramter to the parseUri function.

CVE-2021-43298 embedthis vulnerability CVSS: 5.0 25 Jan 2022, 20:15 UTC

The code that performs password matching when using 'Basic' HTTP authentication does not use a constant-time memcmp and has no rate-limiting. This means that an unauthenticated network attacker can brute-force the HTTP basic password, byte-by-byte, by recording the webserver's response time until the unauthorized (401) response.

CVE-2021-42342 embedthis vulnerability CVSS: 7.5 14 Oct 2021, 06:15 UTC

An issue was discovered in GoAhead 4.x and 5.x before 5.1.5. In the file upload filter, user form variables can be passed to CGI scripts without being prefixed with the CGI prefix. This permits tunneling untrusted environment variables into vulnerable CGI scripts.

CVE-2020-15688 embedthis vulnerability CVSS: 6.8 23 Jul 2020, 13:15 UTC

The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel.

CVE-2020-15689 embedthis vulnerability CVSS: 5.0 13 Jul 2020, 14:15 UTC

Appweb before 7.2.2 and 8.x before 8.1.0, when built with CGI support, mishandles an HTTP request with a Range header that lacks an exact range. This may result in a NULL pointer dereference and cause a denial of service.

CVE-2019-5097 embedthis vulnerability CVSS: 5.0 03 Dec 2019, 22:15 UTC

A denial-of-service vulnerability exists in the processing of multi-part/form-data requests in the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to an infinite loop in the process. The request can be unauthenticated in the form of GET or POST requests and does not require the requested resource to exist on the server.

CVE-2019-5096 embedthis vulnerability CVSS: 7.5 03 Dec 2019, 22:15 UTC

An exploitable code execution vulnerability exists in the processing of multi-part/form-data requests within the base GoAhead web server application in versions v5.0.1, v.4.1.1 and v3.6.5. A specially crafted HTTP request can lead to a use-after-free condition during the processing of this request that can be used to corrupt heap structures that could lead to full code execution. The request can be unauthenticated in the form of GET or POST requests, and does not require the requested resource to exist on the server.

CVE-2019-19240 embedthis vulnerability CVSS: 5.0 22 Nov 2019, 19:15 UTC

Embedthis GoAhead before 5.0.1 mishandles redirected HTTP requests with a large Host header. The GoAhead WebsRedirect uses a static host buffer that has a limited length and can overflow. This can cause a copy of the Host header to fail, leaving that buffer uninitialized, which may leak uninitialized data in a response.

CVE-2019-16645 embedthis vulnerability CVSS: 5.0 20 Sep 2019, 19:15 UTC

An issue was discovered in Embedthis GoAhead 2.5.0. Certain pages (such as goform/login and config/log_off_page.htm) create links containing a hostname obtained from an arbitrary HTTP Host header sent by an attacker. This could potentially be used in a phishing attack.

CVE-2019-12822 embedthis vulnerability CVSS: 5.0 14 Jun 2019, 14:29 UTC

In http.c in Embedthis GoAhead before 4.1.1 and 5.x before 5.0.1, a header parsing vulnerability causes a memory assertion, out-of-bounds memory reference, and potential DoS, as demonstrated by a colon on a line by itself.

CVE-2018-15505 embedthis vulnerability CVSS: 5.0 18 Aug 2018, 03:29 UTC

An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ']' character in an IPv6 address.

CVE-2018-15504 embedthis vulnerability CVSS: 5.0 18 Aug 2018, 03:29 UTC

An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.

CVE-2018-8715 embedthis vulnerability CVSS: 6.8 15 Mar 2018, 01:29 UTC

The Embedthis HTTP library, and Appweb versions before 7.0.3, have a logic flaw related to the authCondition function in http/httpLib.c. With a forged HTTP request, it is possible to bypass authentication for the form and digest login types.

CVE-2017-1000471 embedthis vulnerability CVSS: 7.5 03 Jan 2018, 20:29 UTC

EmbedThis GoAhead Webserver version 4.0.0 is vulnerable to a NULL pointer dereference in the CGI handler resulting in memory corruption or denial of service.

CVE-2017-1000470 embedthis vulnerability CVSS: 5.0 03 Jan 2018, 20:29 UTC

EmbedThis GoAhead Webserver versions 4.0.0 and earlier is vulnerable to an integer overflow in the HTTP listener resulting in denial of service.

CVE-2017-17562 embedthis vulnerability CVSS: 6.8 12 Dec 2017, 19:29 UTC

Embedthis GoAhead before 3.6.5 allows remote code execution if CGI is enabled and a CGI program is dynamically linked. This is a result of initializing the environment of forked CGI scripts using untrusted HTTP request parameters in the cgiHandler function in cgi.c. When combined with the glibc dynamic linker, this behaviour can be abused for remote code execution using special parameter names such as LD_PRELOAD. An attacker can POST their shared object payload in the body of the request, and reference it using /proc/self/fd/0.

CVE-2017-14149 embedthis vulnerability CVSS: 5.0 05 Sep 2017, 07:29 UTC

GoAhead 3.4.0 through 3.6.5 has a NULL Pointer Dereference in the websDecodeUrl function in http.c, leading to a crash for a "POST / HTTP/1.1" request.

CVE-2017-5675 embedthis vulnerability CVSS: 9.0 13 Mar 2017, 06:59 UTC

A command-injection vulnerability exists in a web application on a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models. The mail-sending form in the mail.htm page allows an attacker to inject a command into the receiver1 field in the form; it will be executed with root privileges.

CVE-2017-5674 embedthis vulnerability CVSS: 5.0 13 Mar 2017, 06:59 UTC

A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP ("GET system.ini HTTP/1.1\n\n" - note the lack of "/" in the path field of the request) request that will disclose the configuration file with the login password.

CVE-2014-9708 embedthis vulnerability CVSS: 5.0 31 Mar 2015, 14:59 UTC

Embedthis Appweb before 4.6.6 and 5.x before 5.2.1 allows remote attackers to cause a denial of service (NULL pointer dereference) via a Range header with an empty value, as demonstrated by "Range: x=,".

CVE-2014-9707 embedthis vulnerability CVSS: 7.5 31 Mar 2015, 14:59 UTC

EmbedThis GoAhead 3.0.0 through 3.4.1 does not properly handle path segments starting with a . (dot), which allows remote attackers to conduct directory traversal attacks, cause a denial of service (heap-based buffer overflow and crash), or possibly execute arbitrary code via a crafted URI.