CVE-2015-3154
Description
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CRLF injection in Zend\Mail and Zend\Http components of Zend Framework allowed attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks.
Vulnerability
Description
CVE-2015-3154 is a CRLF injection vulnerability in the Zend\Mail (Zend_Mail) and Zend\Http components of the Zend Framework, affecting versions before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 [1]. The vulnerability arises because the framework failed to sanitize or validate email headers for carriage return (\r) and line feed (\n) sequences, allowing an attacker to inject arbitrary CRLF sequences into header values [2].
Exploitation
Method
An attacker can exploit this by providing a maliciously crafted header value containing CRLF sequences, such as in the subject line of an email. The injected CRLF sequence causes the email body to be split, allowing the attacker to insert arbitrary content, including HTML and iframes, into the message. For example, a subject containing "\r\nContent-Type: text/html; charset = \"iso-8859-1\"\r\n\r\n" would cause a mail server to interpret the HTML as the message body, bypassing the intended body [2]. The same class of attack also applies to HTTP headers via Zend\Http, enabling HTTP response splitting [1][2].
Impact
A successful attack can lead to HTTP response splitting and header injection, potentially enabling XSS (cross-site scripting), cache poisoning, or session hijacking. The attacker could manipulate email content or HTTP responses to deceive users, redirect them to malicious sites, or perform phishing attacks [1][2].
Mitigation
The Zend Framework team addressed the vulnerability by introducing new header validation and filtering classes in version 2 (Zend\Mail\Header\HeaderName, Zend\Mail\Header\HeaderValue, Zend\Http\Header\HeaderValue) that use static methods to validate and sanitize header values according to IETF specifications [2]. Users should upgrade to Zend Framework 1.12.12, 2.3.8, 2.4.1, or later. This CVE is not listed in CISA's Known Exploited Vulnerabilities (KEV) catalog [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
zendframework/zend-httpPackagist | >= 2.0.0beta4, < 2.3.8 | 2.3.8 |
zendframework/zend-httpPackagist | >= 2.4.0rc1, < 2.4.1 | 2.4.1 |
zendframework/zendframeworkPackagist | >= 2.0.0beta4, < 2.3.8 | 2.3.8 |
zendframework/zendframeworkPackagist | >= 2.4.0rc1, < 2.4.1 | 2.4.1 |
zendframework/zendframework1Packagist | < 1.12.12 | 1.12.12 |
zendframework/zend-httpPackagist | < 1.12.12 | 1.12.12 |
Affected products
4- ghsa-coords3 versionspkg:composer/zendframework/zendframeworkpkg:composer/zendframework/zendframework1pkg:composer/zendframework/zend-http
>= 2.0.0beta4, < 2.3.8+ 2 more
- (no CPE)range: >= 2.0.0beta4, < 2.3.8
- (no CPE)range: < 1.12.12
- (no CPE)range: >= 2.0.0beta4, < 2.3.8
- Zend Technologies/Zend Frameworkv5Range: before 1.12.12
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-5957-5crx-79jxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2015-3154ghsaADVISORY
- framework.zend.com/security/advisory/ZF2015-04mitrex_refsource_CONFIRM
- framework.zend.com/security/advisory/ZF2015-04ghsaWEB
- github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-http/CVE-2015-3154.yamlghsaWEB
- github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zendframework/CVE-2015-3154.yamlghsaWEB
- github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zendframework1/CVE-2015-3154.yamlghsaWEB
News mentions
0No linked articles in our index yet.