Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28434: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in yhirose cpp-httplib

0
Medium
VulnerabilityCVE-2026-28434cvecve-2026-28434cwe-200
Published: Wed Mar 04 2026 (03/04/2026, 19:34:30 UTC)
Source: CVE Database V5
Vendor/Project: yhirose
Product: cpp-httplib

Description

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.35.0, when a request handler throws a C++ exception and the application has not registered a custom exception handler via set_exception_handler(), the library catches the exception and writes its message directly into the HTTP response as a header named EXCEPTION_WHAT. This header is sent to whoever made the request, with no authentication check and no special configuration required to trigger it. The behavior is on by default. A developer who does not know to opt in to set_exception_handler() will ship a server that leaks internal exception messages to any client. This vulnerability is fixed in 0.35.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 20:15:28 UTC

Technical Analysis

The cpp-httplib library is a popular C++11 single-header HTTP/HTTPS library used for building cross-platform web servers and clients. In versions prior to 0.35.0, if a request handler throws a C++ exception and the application developer has not registered a custom exception handler using set_exception_handler(), the library internally catches the exception and writes the exception's message directly into the HTTP response header named EXCEPTION_WHAT. This header is sent back to the client that made the request without any authentication or authorization checks, effectively exposing internal exception details to unauthorized actors. Since this behavior is enabled by default, developers unaware of this mechanism may inadvertently ship servers that leak sensitive debugging or internal state information. Such information disclosure can reveal implementation details, internal error messages, or other sensitive data that could assist attackers in reconnaissance or crafting targeted attacks. The vulnerability is tracked as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and has a CVSS 3.1 base score of 5.3 (medium severity), reflecting its ease of exploitation (network accessible, no privileges or user interaction required) but limited impact (confidentiality only, no integrity or availability impact). The issue is resolved in cpp-httplib version 0.35.0 by requiring explicit registration of a custom exception handler to control exception message exposure, thus preventing automatic leakage of exception details in HTTP headers.

Potential Impact

This vulnerability primarily impacts the confidentiality of information processed by servers using vulnerable versions of cpp-httplib. By exposing internal exception messages to any unauthenticated client, attackers can gain insights into the server's internal logic, error conditions, and possibly sensitive data embedded in exception messages. This information can facilitate further attacks such as crafting more precise injection attacks, identifying software versions, or uncovering other vulnerabilities. Although it does not directly affect integrity or availability, the information disclosure can be a critical step in a multi-stage attack. Organizations deploying cpp-httplib-based servers in production environments risk leaking sensitive debugging or operational details, which can undermine security posture and compliance requirements. The vulnerability is especially concerning for internet-facing services where attackers can freely send requests to trigger exceptions and harvest the leaked information. However, no known exploits are reported in the wild as of now, which may limit immediate impact but does not reduce the urgency of remediation.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade cpp-httplib to version 0.35.0 or later, where the issue is fixed by requiring explicit registration of a custom exception handler. If upgrading is not immediately feasible, developers should implement and register a custom exception handler via set_exception_handler() that safely handles exceptions without exposing sensitive details in HTTP responses. This handler should log exception details securely on the server side and return generic error messages to clients. Additionally, developers should audit their code to ensure no other mechanisms leak internal information. Network-level protections such as web application firewalls (WAFs) can be configured to detect and block suspicious requests that might trigger exceptions. Monitoring HTTP response headers for unexpected EXCEPTION_WHAT headers can help detect vulnerable deployments. Finally, security teams should incorporate this vulnerability into their vulnerability management and patching processes to ensure timely remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-27T15:54:05.138Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a88c81d1a09e29cb6b4cb7

Added to database: 3/4/2026, 7:48:17 PM

Last enriched: 3/11/2026, 8:15:28 PM

Last updated: 4/19/2026, 12:26:56 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses