DEBIAN-CVE-2025-66570

Source
https://security-tracker.debian.org/tracker/CVE-2025-66570
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-66570.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-66570
Upstream
Published
2025-12-05T19:15:51.923Z
Modified
2025-12-11T11:14:28.125493Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.27.0, a vulnerability allows attacker-controlled HTTP headers to influence server-visible metadata, logging, and authorization decisions. An attacker can inject headers named REMOTEADDR, REMOTEPORT, LOCALADDR, LOCALPORT that are parsed into the request header multimap via readheaders() in httplib.h (headers.emplace), then the server later appends its own internal metadata using the same header names in Server::processrequest without erasing duplicates. Because Request::getheadervalue returns the first entry for a header key (id == 0) and the client-supplied headers are parsed before server-inserted headers, downstream code that uses these header names may inadvertently use attacker-controlled values. Affected files/locations: cpp-httplib/httplib.h (readheaders, Server::processrequest, Request::getheadervalue, getheadervalueu64) and cpp-httplib/docker/main.cc (getclientip, nginxaccesslogger, nginxerror_logger). Attack surface: attacker-controlled HTTP headers in incoming requests flow into the Request.headers multimap and into logging code that reads forwarded headers, enabling IP spoofing, log poisoning, and authorization bypass via header shadowing. This vulnerability is fixed in 0.27.0.

References

Affected packages

Debian:12 / cpp-httplib

Package

Name
cpp-httplib
Purl
pkg:deb/debian/cpp-httplib?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.11.4+ds-1
0.11.4+ds-1+deb12u1
0.11.4+ds-2
0.11.4+ds-3
0.13.1+ds-1
0.14.0+ds-1
0.14.1+ds-1
0.14.1+ds-2
0.14.2+ds-1
0.14.3+ds-1
0.14.3+ds-1.1~exp1
0.14.3+ds-1.1
0.15.3+ds-1
0.15.3+ds-2
0.15.3+ds-3
0.16.0+ds-1
0.16.3+ds-1
0.16.3+ds-2
0.18.0+ds-1
0.18.7-1
0.20.1+ds-3
0.25.0+ds-1
0.26.0+ds-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-66570.json"

Debian:13 / cpp-httplib

Package

Name
cpp-httplib
Purl
pkg:deb/debian/cpp-httplib?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.18.7-1
0.20.1+ds-3
0.25.0+ds-1
0.26.0+ds-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-66570.json"

Debian:14 / cpp-httplib

Package

Name
cpp-httplib
Purl
pkg:deb/debian/cpp-httplib?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.18.7-1
0.20.1+ds-3
0.25.0+ds-1
0.26.0+ds-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-66570.json"