CVE-2026-27480

Source
https://cve.org/CVERecord?id=CVE-2026-27480
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27480.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27480
Aliases
Published
2026-02-21T09:14:30.376Z
Modified
2026-02-24T19:35:21.285483Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
Static Web Server: Timing-Based Username Enumeration in Basic Authentication
Details

Static Web Server (SWS) is a production-ready web server suitable for static web files or assets. In versions 2.1.0 through 2.40.1, a timing-based username enumeration vulnerability in Basic Authentication allows attackers to identify valid users by exploiting early responses for invalid usernames, enabling targeted brute-force or credential-stuffing attacks. SWS checks whether a username exists before verifying the password, causing valid usernames to follow a slower code path (e.g., bcrypt hashing) while invalid usernames receive an immediate 401 response. This timing discrepancy allows attackers to enumerate valid accounts by measuring response-time differences. This issue has been fixed in version 2.41.0.

Database specific
{
    "cwe_ids": [
        "CWE-204"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27480.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/static-web-server/static-web-server

Affected ranges

Type
GIT
Repo
https://github.com/static-web-server/static-web-server
Events

Affected versions

v2.*
v2.1.0
v2.10.0
v2.11.0
v2.12.0
v2.13.0
v2.13.1
v2.14.0
v2.14.1
v2.14.2
v2.15.0
v2.16.0
v2.17.0
v2.18.0
v2.19.0
v2.2.0
v2.20.0
v2.20.1
v2.20.2
v2.21.0
v2.21.1
v2.22.0
v2.22.1
v2.23.0
v2.24.0
v2.24.1
v2.24.2
v2.25.0
v2.26.0
v2.27.0
v2.28.0
v2.3.0
v2.30.0
v2.31.0
v2.31.1
v2.32.0
v2.32.1
v2.32.2
v2.33.0
v2.33.1
v2.34.0
v2.35.0
v2.36.0
v2.36.1
v2.37.0
v2.38.0
v2.38.1
v2.39.0
v2.4.0
v2.40.0
v2.40.1
v2.5.0
v2.6.0
v2.6.0-beta.1
v2.6.0-beta.2
v2.7.0
v2.7.1
v2.8.0
v2.9.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27480.json"