Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1990: NULL Pointer Dereference in oatpp

0
Medium
VulnerabilityCVE-2026-1990cvecve-2026-1990
Published: Fri Feb 06 2026 (02/06/2026, 05:02:08 UTC)
Source: CVE Database V5
Product: oatpp

Description

CVE-2026-1990 is a medium severity vulnerability in the oatpp framework versions up to 1. 3. 1, caused by a null pointer dereference in the ObjectWrapper constructor function. Exploitation requires local access and low privileges, with no user interaction needed. The flaw can cause application crashes or denial of service but does not directly lead to code execution or data leakage. Although publicly disclosed, no known exploits are currently in the wild, and the project has not yet issued a patch. European organizations using oatpp in local or internal environments may face service disruptions if exploited. Mitigation involves restricting local access, monitoring for crashes, and applying patches once available. Countries with strong software development sectors and industries relying on custom C++ web frameworks, such as Germany, France, and the UK, are more likely to be affected. Given the limited scope and local access requirement, the threat is medium severity.

AI-Powered Analysis

AILast updated: 02/06/2026, 05:29:26 UTC

Technical Analysis

CVE-2026-1990 identifies a null pointer dereference vulnerability in the oatpp C++ web framework, specifically in the ObjectWrapper constructor located in src/oatpp/data/type/Type.hpp. This flaw occurs when the function improperly handles object initialization, leading to a null pointer dereference that can crash the application or cause denial of service. The vulnerability affects oatpp versions 1.3.0 and 1.3.1. Exploitation requires local access with low privileges, meaning an attacker must have some level of access to the host system but does not require elevated privileges or user interaction. The vulnerability does not impact confidentiality or integrity directly but affects availability by potentially crashing services relying on oatpp. The vulnerability was responsibly disclosed to the project, but no patch has been released yet. No known exploits have been observed in the wild, but public disclosure increases the risk of exploitation attempts. The CVSS 4.0 score of 4.8 reflects the medium severity, considering the local attack vector and limited impact scope. Organizations using oatpp internally or in embedded systems should be aware of this issue and prepare mitigations.

Potential Impact

For European organizations, the primary impact of CVE-2026-1990 is potential denial of service due to application crashes in systems using vulnerable oatpp versions. This can disrupt internal services, APIs, or microservices that rely on oatpp for data handling and web communication. Since exploitation requires local access, the risk is higher in environments where multiple users have system access or where attackers can gain foothold through other means. The vulnerability does not expose sensitive data or allow privilege escalation, limiting its impact on confidentiality and integrity. However, availability disruptions can affect business continuity, especially in sectors relying on real-time data processing or critical internal applications. Organizations with development or production environments using oatpp should assess exposure and prepare for incident response. The lack of a patch increases the window of vulnerability, emphasizing the need for compensating controls.

Mitigation Recommendations

To mitigate CVE-2026-1990, European organizations should first restrict local access to systems running oatpp, ensuring only trusted users have shell or local login capabilities. Implement strict access controls and monitoring to detect unusual local activity. Since no official patch is available yet, consider applying temporary code-level mitigations such as input validation or safe object initialization checks if feasible. Monitor application logs for crashes or abnormal behavior indicative of null pointer dereference. Employ runtime protections like address sanitizer or memory error detection tools during development and testing. Plan for rapid patch deployment once the oatpp project releases a fix. Additionally, conduct internal audits to identify all instances of oatpp usage and update dependency management processes to include this vulnerability. Educate developers and system administrators about the vulnerability and its exploitation requirements to reduce risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-05T15:39:58.228Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698578ddf9fa50a62fd6124f

Added to database: 2/6/2026, 5:15:09 AM

Last enriched: 2/6/2026, 5:29:26 AM

Last updated: 2/6/2026, 6:28:29 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats