{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7111","assignerOrgId":"9b29abf9-4ab0-4765-b253-1875cd9b441e","state":"PUBLISHED","assignerShortName":"CPANSec","dateReserved":"2026-04-26T15:31:25.111Z","datePublished":"2026-04-29T14:22:29.358Z","dateUpdated":"2026-04-29T17:49:17.981Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://cpan.org/modules","defaultStatus":"unaffected","packageName":"Text-CSV_XS","product":"Text::CSV_XS","programFiles":["CSV_XS.xs"],"programRoutines":[{"name":"Text::CSV_XS::Parse"},{"name":"Text::CSV_XS::print"},{"name":"Text::CSV_XS::getline"},{"name":"Text::CSV_XS::getline_all"}],"repo":"https://github.com/cpan-authors/Text-CSV_XS","vendor":"HMBRAND","versions":[{"lessThan":"1.62","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"analyst","value":"Leon Timmermans"}],"descriptions":[{"lang":"en","value":"Text::CSV_XS versions before 1.62 for Perl have a use-after-free when registered callbacks extend the Perl argument stack, which may enable type confusion or memory corruption.\n\nThe Parse, print, getline, and getline_all methods invoke registered callbacks (for example after_parse, before_print, or on_error) and cache the Perl argument stack pointer across the call. If a callback extends the argument stack enough to trigger a reallocation, the return value is written through the stale pointer into the freed buffer, and the caller reads the original $self argument as the return value instead.\n\nCalling code that expects parsed data from getline_all receives the Text::CSV_XS object in its place, leading to logic errors or crashes. Text::CSV_XS objects used without any registered callbacks are not affected."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-825","description":"CWE-825 Expired Pointer Dereference","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-416","description":"CWE-416 Use After Free","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"9b29abf9-4ab0-4765-b253-1875cd9b441e","shortName":"CPANSec","dateUpdated":"2026-04-29T14:22:29.358Z"},"references":[{"tags":["patch"],"url":"https://github.com/cpan-authors/Text-CSV_XS/commit/c17f31a5f2bf36674748eb4b6e25672f0571a224.patch"},{"tags":["release-notes"],"url":"https://metacpan.org/release/HMBRAND/Text-CSV_XS-1.62/changes"}],"solutions":[{"lang":"en","value":"Upgrade to 1.62 or later."}],"source":{"discovery":"UNKNOWN"},"timeline":[{"lang":"en","time":"2026-04-25T00:00:00.000Z","value":"Fix committed to public Github repository"},{"lang":"en","time":"2026-04-26T00:00:00.000Z","value":"CVE number reserved"},{"lang":"en","time":"2026-04-29T00:00:00.000Z","value":"Version 1.62 with the fix released to CPAN"}],"title":"Text::CSV_XS versions before 1.62 for Perl have a use-after-free when registered callbacks extend the Perl argument stack, which may enable type confusion or memory corruption","x_generator":{"engine":"cpansec-cna-tool 0.1"}},"adp":[{"title":"CVE Program Container","references":[{"url":"http://www.openwall.com/lists/oss-security/2026/04/29/17"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2026-04-29T16:33:25.483Z"}},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8.4,"attackVector":"LOCAL","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2026-04-29T17:49:05.158465Z","id":"CVE-2026-7111","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-29T17:49:17.981Z"}}]}}