Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28434: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in yhirose cpp-httplib

0
Medium
VulnerabilityCVE-2026-28434cvecve-2026-28434cwe-200
Published: Wed Mar 04 2026 (03/04/2026, 19:34:30 UTC)
Source: CVE Database V5
Vendor/Project: yhirose
Product: cpp-httplib

Description

CVE-2026-28434 is a medium severity vulnerability in the yhirose cpp-httplib library versions prior to 0. 35. 0. When a request handler throws a C++ exception and no custom exception handler is registered, the library catches the exception and exposes its message in an HTTP response header named EXCEPTION_WHAT. This header is sent to any client making the request without authentication or special configuration, leading to unintended leakage of sensitive internal exception details. The vulnerability arises from the default behavior of the library and can be mitigated by upgrading to version 0. 35. 0 or later, or by explicitly registering a custom exception handler. While no known exploits are reported in the wild, affected applications risk information disclosure that could aid attackers in reconnaissance or further exploitation. Organizations using cpp-httplib in server applications should assess their versions and exception handling configurations promptly.

AI-Powered Analysis

AILast updated: 03/04/2026, 20:02:51 UTC

Technical Analysis

The vulnerability identified as CVE-2026-28434 affects the yhirose cpp-httplib, a widely used C++11 single-file header-only HTTP/HTTPS library. In versions prior to 0.35.0, if a request handler throws a C++ exception and the application developer has not registered a custom exception handler via the set_exception_handler() API, the library internally catches the exception and writes the exception's message directly into the HTTP response header named EXCEPTION_WHAT. This header is included in the response sent back to the client that made the request, without any authentication or authorization checks. The default behavior is enabled by default, meaning developers unaware of this feature may inadvertently ship servers that leak internal exception messages to any requesting client. These exception messages may contain sensitive information such as internal logic details, file paths, or other debugging data that could assist attackers in understanding the server's internal workings. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). It does not require user interaction, authentication, or complex attack vectors to exploit, making it relatively easy to trigger. The issue was addressed and fixed in cpp-httplib version 0.35.0 by changing this behavior, presumably by requiring explicit opt-in for exception message exposure or by suppressing such messages in responses. No known exploits have been reported in the wild as of the publication date, but the risk remains for applications using affected versions without mitigation.

Potential Impact

The primary impact of this vulnerability is the unintended disclosure of sensitive internal exception messages to any unauthenticated client making HTTP requests to a server using the vulnerable cpp-httplib versions. This information leakage can aid attackers in reconnaissance by revealing internal server logic, error conditions, file paths, or other sensitive debugging information. Such intelligence can facilitate further targeted attacks, including exploitation of other vulnerabilities or crafting of more effective social engineering or injection attacks. Although this vulnerability does not directly allow code execution or denial of service, the confidentiality breach can compromise the security posture of affected organizations. The scope of impact includes any organization deploying server applications built with cpp-httplib versions prior to 0.35.0 that do not implement a custom exception handler. Given the library's cross-platform nature and popularity in C++ projects, the vulnerability could affect a broad range of industries and geographies. The ease of exploitation and lack of required authentication increase the risk, especially for publicly accessible services.

Mitigation Recommendations

Organizations should immediately identify any applications using cpp-httplib versions earlier than 0.35.0. The most effective mitigation is to upgrade to cpp-httplib version 0.35.0 or later, where this vulnerability is fixed. If upgrading is not immediately feasible, developers should implement a custom exception handler using the set_exception_handler() API to prevent exception messages from being included in HTTP response headers. Additionally, server administrators should review and restrict access to sensitive endpoints and consider implementing web application firewalls (WAFs) to detect and block suspicious requests that may trigger exceptions. Logging and monitoring should be enhanced to detect unusual patterns that could indicate exploitation attempts. Developers should also audit their code to ensure that exception handling does not leak sensitive information through other channels. Finally, educating development teams about secure exception handling practices in cpp-httplib is recommended to prevent similar issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-27T15:54:05.138Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a88c81d1a09e29cb6b4cb7

Added to database: 3/4/2026, 7:48:17 PM

Last enriched: 3/4/2026, 8:02:51 PM

Last updated: 3/4/2026, 9:01:24 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses