Source: cpp-httplib
Version: 0.18.7-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for cpp-httplib.

CVE-2026-28434[0]:
| cpp-httplib is a C++11 single-file header-only cross platform
| HTTP/HTTPS library. Prior to 0.35.0, when a request handler throws a
| C++ exception and the application has not registered a custom
| exception handler via set_exception_handler(), the library catches
| the exception and writes its message directly into the HTTP response
| as a header named EXCEPTION_WHAT. This header is sent to whoever
| made the request, with no authentication check and no special
| configuration required to trigger it. The behavior is on by default.
| A developer who does not know to opt in to set_exception_handler()
| will ship a server that leaks internal exception messages to any
| client. This vulnerability is fixed in 0.35.0.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-28434
    https://www.cve.org/CVERecord?id=CVE-2026-28434
[1] 
https://github.com/yhirose/cpp-httplib/security/advisories/GHSA-8mpw-r4gc-xm7q
[2] 
https://github.com/yhirose/cpp-httplib/commit/defd907c7469c5c8281247b73bbd07be24c31164

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to