OESA-2026-1552

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-1552
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-1552.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2026-1552
Upstream
Published
2026-03-15T05:53:06Z
Modified
2026-03-15T06:18:42.262288Z
Summary
cpp-httplib security update
Details

A C++11 single-file header-only cross platform HTTP/HTTPS library. It's extremely easy to setup. Just include httplib.h file in your code!

Security Fix(es):

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.35.0, when a request handler throws a C++ exception and the application has not registered a custom exception handler via setexceptionhandler(), the library catches the exception and writes its message directly into the HTTP response as a header named EXCEPTIONWHAT. This header is sent to whoever made the request, with no authentication check and no special configuration required to trigger it. The behavior is on by default. A developer who does not know to opt in to setexception_handler() will ship a server that leaks internal exception messages to any client. This vulnerability is fixed in 0.35.0.(CVE-2026-28434)

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.35.0, cpp-httplib (httplib.h) does not enforce Server::setpayloadmax_length() on the decompressed request body when using HandlerWithContentReader (streaming ContentReader) with Content-Encoding: gzip (or other supported encodings). A small compressed payload can expand beyond the configured payload limit and be processed by the application, enabling a payload size limit bypass and potential denial of service (CPU/memory exhaustion). This vulnerability is fixed in 0.35.0.(CVE-2026-28435)

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.37.0, cpp-httplib uses std::regex (libstdc++) to parse RFC 5987 encoded filename* values in multipart Content-Disposition headers. The regex engine in libstdc++ implements backtracking via deep recursion, consuming one stack frame per input character. An attacker can send a single HTTP POST request with a crafted filename* parameter that causes uncontrolled stack growth, resulting in a stack overflow (SIGSEGV) that crashes the server process. This issue has been patched in version 0.37.0.(CVE-2026-29076)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:24.03-LTS-SP1 / cpp-httplib

Package

Name
cpp-httplib
Purl
pkg:rpm/openEuler/cpp-httplib&distro=openEuler-24.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.37.0-1.oe2403sp1

Ecosystem specific

{
    "x86_64": [
        "cpp-httplib-0.37.0-1.oe2403sp1.x86_64.rpm",
        "cpp-httplib-debuginfo-0.37.0-1.oe2403sp1.x86_64.rpm",
        "cpp-httplib-debugsource-0.37.0-1.oe2403sp1.x86_64.rpm",
        "cpp-httplib-devel-0.37.0-1.oe2403sp1.x86_64.rpm"
    ],
    "aarch64": [
        "cpp-httplib-0.37.0-1.oe2403sp1.aarch64.rpm",
        "cpp-httplib-debuginfo-0.37.0-1.oe2403sp1.aarch64.rpm",
        "cpp-httplib-debugsource-0.37.0-1.oe2403sp1.aarch64.rpm",
        "cpp-httplib-devel-0.37.0-1.oe2403sp1.aarch64.rpm"
    ],
    "src": [
        "cpp-httplib-0.37.0-1.oe2403sp1.src.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2026-1552.json"