CVE-2026-29076
Plain English Summary
AI-powered analysis for quick understanding
An attacker can crash a server by sending a specially crafted HTTP POST request with a malicious filename in the multipart headers, which causes the server to run out of memory and stop working. This vulnerability affects versions prior to 0.37.0 of the cpp-httplib library, so updating to the latest version is essential to prevent this issue.
Technical Description
cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.37.0, cpp-httplib uses std::regex (libstdc++) to parse RFC 5987 encoded filename* values in multipart Content-Disposition headers. The regex engine in libstdc++ implements backtracking via deep recursion, consuming one stack frame per input character. An attacker can send a single HTTP POST request with a crafted filename* parameter that causes uncontrolled stack growth, resulting in a stack overflow (SIGSEGV) that crashes the server process. This issue has been patched in version 0.37.0.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 7, 2026
about 1 month ago
Last Modified
Mar 9, 2026
29 days ago
Vendor
yhirose
Product
cpp-httplib