Description
cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.2, when a cpp-httplib client is configured with a proxy and set_follow_location(true), any HTTPS redirect it follows will have TLS certificate and hostname verification silently disabled on the new connection. The client will accept any certificate presented by the redirect target — expired, self-signed, or forged — without raising an error or notifying the application. A network attacker in a position to return a redirect response can fully intercept the follow-up HTTPS connection, including any credentials or session tokens in flight. This vulnerability is fixed in 0.37.2.
Published: 2026-03-13
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: TLS Certificate Verification Bypass
Action: Patch Now
AI Analysis

Impact

The vulnerability exists in cpp-httplib versions prior to 0.37.2. When a client is configured to use a proxy and automatic redirect following is enabled, any HTTPS redirect it follows will have TLS certificate and hostname verification silently disabled on the new connection. The client accepts any certificate presented by the redirect target, including expired, self-signed, or forged certificates, without raising an error or notifying the application. This flaw, classified as CWE-295, allows an attacker controlling the network to intercept the subsequent HTTPS connection and capture or tamper with credentials or session tokens in transit.

Affected Systems

The affected product is the yhirose:cpp-httplib library for all releases before 0.37.2. Any application that uses this header‑only library, configures a proxy, and enables set_follow_location(true) is at risk. The vulnerability is fixed starting with version 0.37.2.

Risk and Exploitability

The CVSS base score of 8.7 indicates high severity. The EPSS score is lower than 1% and the vulnerability is not listed in the CISA KEV catalog, suggesting a relatively low probability of current exploitation. The likely attack vector requires an attacker to control the network path to deliver a malicious redirect response; upon success, confidentiality and integrity of the redirected HTTPS traffic are compromised, allowing full interception or tampering.

Generated by OpenCVE AI on March 17, 2026 at 21:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to cpp-httplib 0.37.2 or newer

Generated by OpenCVE AI on March 17, 2026 at 21:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:yhirose:cpp-httplib:*:*:*:*:*:*:*:*

Mon, 16 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Yhirose
Yhirose cpp-httplib
Vendors & Products Yhirose
Yhirose cpp-httplib

Fri, 13 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.2, when a cpp-httplib client is configured with a proxy and set_follow_location(true), any HTTPS redirect it follows will have TLS certificate and hostname verification silently disabled on the new connection. The client will accept any certificate presented by the redirect target — expired, self-signed, or forged — without raising an error or notifying the application. A network attacker in a position to return a redirect response can fully intercept the follow-up HTTPS connection, including any credentials or session tokens in flight. This vulnerability is fixed in 0.37.2.
Title cpp-httplib has a Silent TLS Certificate Verification Bypass on HTTPS Redirect via Proxy
Weaknesses CWE-295
References
Metrics cvssV3_1

{'score': 8.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}


Subscriptions

Yhirose Cpp-httplib
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-16T15:41:05.578Z

Reserved: 2026-03-12T15:29:36.558Z

Link: CVE-2026-32627

cve-icon Vulnrichment

Updated: 2026-03-16T15:31:39.495Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:40.270

Modified: 2026-03-17T19:08:44.583

Link: CVE-2026-32627

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:39:33Z

Weaknesses