Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27633: CWE-400: Uncontrolled Resource Consumption in maximmasiutin TinyWeb

0
High
VulnerabilityCVE-2026-27633cvecve-2026-27633cwe-400
Published: Wed Feb 25 2026 (02/25/2026, 23:07:35 UTC)
Source: CVE Database V5
Vendor/Project: maximmasiutin
Product: TinyWeb

Description

TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Versions prior to version 2.02 have a Denial of Service (DoS) vulnerability via memory exhaustion. Unauthenticated remote attackers can send an HTTP POST request to the server with an exceptionally large `Content-Length` header (e.g., `2147483647`). The server continuously allocates memory for the request body (`EntityBody`) while streaming the payload without enforcing any maximum limit, leading to all available memory being consumed and causing the server to crash. Anyone hosting services using TinyWeb is impacted. Version 2.02 fixes the issue. The patch introduces a `CMaxEntityBodySize` limit (set to 10MB) for the maximum size of accepted payloads. As a temporary workaround if upgrading is not immediately possible, consider placing the server behind a Web Application Firewall (WAF) or reverse proxy (like nginx or Cloudflare) configured to explicitly limit the maximum allowed HTTP request body size (e.g., `client_max_body_size` in nginx).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 11:07:10 UTC

Technical Analysis

TinyWeb is a lightweight HTTP/HTTPS server written in Delphi targeting Win32 platforms. Versions before 2.02 contain a critical resource exhaustion vulnerability (CWE-400) that leads to Denial of Service. The flaw arises because the server does not impose any upper bound on the size of the HTTP request body it accepts. An attacker can send a POST request with a very large Content-Length header (e.g., 2,147,483,647 bytes) causing the server to allocate memory continuously while streaming the request body. This unchecked memory allocation eventually consumes all available system memory, causing the server process to crash and resulting in service disruption. The vulnerability requires no authentication or user interaction, making it trivially exploitable remotely. The vendor fixed the issue in TinyWeb 2.02 by adding a configurable limit (CMaxEntityBodySize) set to 10MB on accepted payload sizes. No known exploits are reported in the wild yet. Temporary mitigations include deploying TinyWeb behind a Web Application Firewall or reverse proxy such as nginx or Cloudflare, configured to limit the maximum HTTP request body size (e.g., nginx’s client_max_body_size directive). This prevents oversized requests from reaching the vulnerable server. The CVSS 4.0 base score is 8.7 (high), reflecting the ease of exploitation, lack of authentication, and high impact on availability.

Potential Impact

This vulnerability can cause complete denial of service on servers running vulnerable versions of TinyWeb by exhausting system memory and crashing the server process. Organizations relying on TinyWeb for web services risk service outages, potentially impacting business operations, customer access, and internal applications. The attack can be launched remotely and anonymously, increasing the risk of opportunistic or targeted disruption. In environments where TinyWeb hosts critical or customer-facing services, this could lead to reputational damage and financial losses. Additionally, repeated exploitation attempts could cause instability in hosting infrastructure. Since TinyWeb is a niche product, the overall global impact may be limited, but organizations using it without patching or mitigations remain vulnerable to straightforward DoS attacks.

Mitigation Recommendations

1. Upgrade TinyWeb to version 2.02 or later immediately to apply the official patch that enforces a maximum request body size of 10MB. 2. If immediate upgrade is not feasible, deploy a Web Application Firewall (WAF) or reverse proxy (e.g., nginx, Cloudflare) in front of TinyWeb servers. Configure these intermediaries to explicitly limit the maximum allowed HTTP request body size (for example, set nginx’s client_max_body_size to 10MB or less). 3. Monitor web server logs for unusually large Content-Length headers or repeated POST requests that could indicate exploitation attempts. 4. Implement network-level rate limiting and anomaly detection to identify and block suspicious traffic patterns targeting TinyWeb servers. 5. Conduct regular vulnerability scanning and penetration testing to ensure no other resource exhaustion vectors exist. 6. Educate system administrators about this vulnerability and ensure patch management processes prioritize this update. 7. Consider isolating TinyWeb services in segmented network zones to limit potential impact of DoS attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T22:02:30.028Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f8527b7ef31ef0b6936cb

Added to database: 2/25/2026, 11:26:31 PM

Last enriched: 3/5/2026, 11:07:10 AM

Last updated: 4/12/2026, 2:31:02 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses