Description
cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.39.0, the cpp-httplib HTTP client forwards stored Basic Auth, Bearer Token, and Digest Auth credentials to arbitrary hosts when following cross-origin HTTP redirects (301/302/307/308). A malicious or compromised server can redirect the client to an attacker-controlled host, which then receives the plaintext credentials in the `Authorization` header. Version 0.39.0 fixes the issue.
Published: 2026-03-27
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Leak of authentication credentials during cross-origin redirects
Action: Immediate Patch
AI Analysis

Impact

The vulnerability causes the cpp-httplib HTTP client to forward stored Basic Auth, Bearer Token, and Digest Auth credentials to any host encountered while following cross‑origin HTTP redirects (301/302/307/308). Consequently, an attacker can receive plaintext credentials in the Authorization header when the client redirects to a malicious domain. This constitutes a confidentiality breach, described by CWE‑200, and could allow an adversary to impersonate users or access protected resources.

Affected Systems

The affected product is yhirose:cpp-httplib, a C++11 header‑only HTTP/HTTPS library. Versions before 0.39.0 are vulnerable. Users running these older releases are subject to credential leakage when automatic redirect handling is enabled.

Risk and Exploitability

The vulnerability has a CVSS score of 7.4, indicating high severity. The EPSS score is less than 1%, suggesting low current exploit probability, and the issue is not listed in CISA’s KEV catalog. The likely attack vector involves an attacker controlling a server that issues a redirect to a malicious host, which captures the Authorization header sent by the client. If the client transmits credentials across the redirect, the attacker gains those credentials. Exploitation requires the client to follow the redirect automatically, which is the default behavior of the library.

Generated by OpenCVE AI on April 2, 2026 at 04:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to cpp-httplib version 0.39.0 or later, which removes the credential leakage flaw.

Generated by OpenCVE AI on April 2, 2026 at 04:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:yhirose:cpp-httplib:*:*:*:*:*:*:*:*

Mon, 30 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Yhirose
Yhirose cpp-httplib
Vendors & Products Yhirose
Yhirose cpp-httplib

Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Description cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.39.0, the cpp-httplib HTTP client forwards stored Basic Auth, Bearer Token, and Digest Auth credentials to arbitrary hosts when following cross-origin HTTP redirects (301/302/307/308). A malicious or compromised server can redirect the client to an attacker-controlled host, which then receives the plaintext credentials in the `Authorization` header. Version 0.39.0 fixes the issue.
Title cpp-httplib Client Leaks Authentication Credentials to Untrusted Hosts on Cross-Origin HTTP Redirect
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Yhirose Cpp-httplib
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-01T03:55:22.387Z

Reserved: 2026-03-23T17:34:57.562Z

Link: CVE-2026-33745

cve-icon Vulnrichment

Updated: 2026-03-30T11:55:33.934Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T01:16:21.167

Modified: 2026-04-01T14:44:55.477

Link: CVE-2026-33745

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:55:48Z

Weaknesses