CVE-2026-28434: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in yhirose cpp-httplib
CVE-2026-28434 is a medium severity vulnerability in the yhirose cpp-httplib library versions prior to 0. 35. 0. When a request handler throws a C++ exception and no custom exception handler is registered, the library catches the exception and exposes its message in an HTTP response header named EXCEPTION_WHAT. This header is sent to any client making the request without authentication or special configuration, leading to unintended leakage of sensitive internal exception details. The vulnerability arises from the default behavior of the library and can be mitigated by upgrading to version 0. 35. 0 or later, or by explicitly registering a custom exception handler. While no known exploits are reported in the wild, affected applications risk information disclosure that could aid attackers in reconnaissance or further exploitation. Organizations using cpp-httplib in server applications should assess their versions and exception handling configurations promptly.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-28434 affects the yhirose cpp-httplib, a widely used C++11 single-file header-only HTTP/HTTPS library. In versions prior to 0.35.0, if a request handler throws a C++ exception and the application developer has not registered a custom exception handler via the set_exception_handler() API, the library internally catches the exception and writes the exception's message directly into the HTTP response header named EXCEPTION_WHAT. This header is included in the response sent back to the client that made the request, without any authentication or authorization checks. The default behavior is enabled by default, meaning developers unaware of this feature may inadvertently ship servers that leak internal exception messages to any requesting client. These exception messages may contain sensitive information such as internal logic details, file paths, or other debugging data that could assist attackers in understanding the server's internal workings. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). It does not require user interaction, authentication, or complex attack vectors to exploit, making it relatively easy to trigger. The issue was addressed and fixed in cpp-httplib version 0.35.0 by changing this behavior, presumably by requiring explicit opt-in for exception message exposure or by suppressing such messages in responses. No known exploits have been reported in the wild as of the publication date, but the risk remains for applications using affected versions without mitigation.
Potential Impact
The primary impact of this vulnerability is the unintended disclosure of sensitive internal exception messages to any unauthenticated client making HTTP requests to a server using the vulnerable cpp-httplib versions. This information leakage can aid attackers in reconnaissance by revealing internal server logic, error conditions, file paths, or other sensitive debugging information. Such intelligence can facilitate further targeted attacks, including exploitation of other vulnerabilities or crafting of more effective social engineering or injection attacks. Although this vulnerability does not directly allow code execution or denial of service, the confidentiality breach can compromise the security posture of affected organizations. The scope of impact includes any organization deploying server applications built with cpp-httplib versions prior to 0.35.0 that do not implement a custom exception handler. Given the library's cross-platform nature and popularity in C++ projects, the vulnerability could affect a broad range of industries and geographies. The ease of exploitation and lack of required authentication increase the risk, especially for publicly accessible services.
Mitigation Recommendations
Organizations should immediately identify any applications using cpp-httplib versions earlier than 0.35.0. The most effective mitigation is to upgrade to cpp-httplib version 0.35.0 or later, where this vulnerability is fixed. If upgrading is not immediately feasible, developers should implement a custom exception handler using the set_exception_handler() API to prevent exception messages from being included in HTTP response headers. Additionally, server administrators should review and restrict access to sensitive endpoints and consider implementing web application firewalls (WAFs) to detect and block suspicious requests that may trigger exceptions. Logging and monitoring should be enhanced to detect unusual patterns that could indicate exploitation attempts. Developers should also audit their code to ensure that exception handling does not leak sensitive information through other channels. Finally, educating development teams about secure exception handling practices in cpp-httplib is recommended to prevent similar issues.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, France, Canada, Australia, China, India
CVE-2026-28434: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in yhirose cpp-httplib
Description
CVE-2026-28434 is a medium severity vulnerability in the yhirose cpp-httplib library versions prior to 0. 35. 0. When a request handler throws a C++ exception and no custom exception handler is registered, the library catches the exception and exposes its message in an HTTP response header named EXCEPTION_WHAT. This header is sent to any client making the request without authentication or special configuration, leading to unintended leakage of sensitive internal exception details. The vulnerability arises from the default behavior of the library and can be mitigated by upgrading to version 0. 35. 0 or later, or by explicitly registering a custom exception handler. While no known exploits are reported in the wild, affected applications risk information disclosure that could aid attackers in reconnaissance or further exploitation. Organizations using cpp-httplib in server applications should assess their versions and exception handling configurations promptly.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-28434 affects the yhirose cpp-httplib, a widely used C++11 single-file header-only HTTP/HTTPS library. In versions prior to 0.35.0, if a request handler throws a C++ exception and the application developer has not registered a custom exception handler via the set_exception_handler() API, the library internally catches the exception and writes the exception's message directly into the HTTP response header named EXCEPTION_WHAT. This header is included in the response sent back to the client that made the request, without any authentication or authorization checks. The default behavior is enabled by default, meaning developers unaware of this feature may inadvertently ship servers that leak internal exception messages to any requesting client. These exception messages may contain sensitive information such as internal logic details, file paths, or other debugging data that could assist attackers in understanding the server's internal workings. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). It does not require user interaction, authentication, or complex attack vectors to exploit, making it relatively easy to trigger. The issue was addressed and fixed in cpp-httplib version 0.35.0 by changing this behavior, presumably by requiring explicit opt-in for exception message exposure or by suppressing such messages in responses. No known exploits have been reported in the wild as of the publication date, but the risk remains for applications using affected versions without mitigation.
Potential Impact
The primary impact of this vulnerability is the unintended disclosure of sensitive internal exception messages to any unauthenticated client making HTTP requests to a server using the vulnerable cpp-httplib versions. This information leakage can aid attackers in reconnaissance by revealing internal server logic, error conditions, file paths, or other sensitive debugging information. Such intelligence can facilitate further targeted attacks, including exploitation of other vulnerabilities or crafting of more effective social engineering or injection attacks. Although this vulnerability does not directly allow code execution or denial of service, the confidentiality breach can compromise the security posture of affected organizations. The scope of impact includes any organization deploying server applications built with cpp-httplib versions prior to 0.35.0 that do not implement a custom exception handler. Given the library's cross-platform nature and popularity in C++ projects, the vulnerability could affect a broad range of industries and geographies. The ease of exploitation and lack of required authentication increase the risk, especially for publicly accessible services.
Mitigation Recommendations
Organizations should immediately identify any applications using cpp-httplib versions earlier than 0.35.0. The most effective mitigation is to upgrade to cpp-httplib version 0.35.0 or later, where this vulnerability is fixed. If upgrading is not immediately feasible, developers should implement a custom exception handler using the set_exception_handler() API to prevent exception messages from being included in HTTP response headers. Additionally, server administrators should review and restrict access to sensitive endpoints and consider implementing web application firewalls (WAFs) to detect and block suspicious requests that may trigger exceptions. Logging and monitoring should be enhanced to detect unusual patterns that could indicate exploitation attempts. Developers should also audit their code to ensure that exception handling does not leak sensitive information through other channels. Finally, educating development teams about secure exception handling practices in cpp-httplib is recommended to prevent similar issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-27T15:54:05.138Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a88c81d1a09e29cb6b4cb7
Added to database: 3/4/2026, 7:48:17 PM
Last enriched: 3/4/2026, 8:02:51 PM
Last updated: 3/4/2026, 9:01:24 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-70225: n/a
UnknownCVE-2025-70221: n/a
HighCVE-2025-46108: n/a
HighCVE-2025-70219: n/a
HighCVE-2026-28435: CWE-400: Uncontrolled Resource Consumption in yhirose cpp-httplib
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.