cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to version 0.30.0, the ``write_headers`` function does not check for CR & LF characters in user supplied headers, allowing untrusted header value to escape header lines.
This vulnerability allows attackers to add extra headers, modify request body unexpectedly & trigger an SSRF attack. When combined with a server that supports http1.1 pipelining (springboot, python twisted etc), this can be used for server side request forgery (SSRF). Version 0.30.0 fixes this issue.
References
| Link | Resource |
|---|---|
| https://github.com/yhirose/cpp-httplib/commit/98048a033a532ff22320ce1d11789f8d5710dfcd | Patch |
| https://github.com/yhirose/cpp-httplib/releases/tag/v0.30.0 | Product Release Notes |
| https://github.com/yhirose/cpp-httplib/security/advisories/GHSA-wpc6-j37r-jcx7 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-01 18:15
Updated : 2026-01-06 18:20
NVD link : CVE-2026-21428
Mitre link : CVE-2026-21428
CVE.ORG link : CVE-2026-21428
JSON object : View
Products Affected
yhirose
- cpp-httplib
CWE
CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')
