Vulnerability: Type: HTTP Response Splitting Target Project: CrowCpp/Crow Tested Version: v1.0+5 (commit dff57edc2374445a2359858d63b43195d4115252) Vulnerability Details: Caused By: Untrusted user input used to build header values in and functions. Attack Vector: Injecting (CRLF) characters to manipulate HTTP response headers or body. Potential Impact: XSS or other security issues. Impact: Malicious users can add arbitrary headers or response body content, potentially leading to XSS vulnerabilities or other attacks. PoC: Demonstrate adding custom headers and response body using user-controlled values. Setup: Dependencies and project installation steps are provided. References: OWASP: https://owasp.org/www-community/attacks/HTTP_Response_Splitting CWE: https://cwe.mitre.org/data/definitions/113.html Similar issues: https://security.snyk.io/vuln/SNYK-SWIFT-APPLESWIFTNIB-3105796