Vulnerability Description
cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.35.0, cpp-httplib (httplib.h) does not enforce Server::set_payload_max_length() on the decompressed request body when using HandlerWithContentReader (streaming ContentReader) with Content-Encoding: gzip (or other supported encodings). A small compressed payload can expand beyond the configured payload limit and be processed by the application, enabling a payload size limit bypass and potential denial of service (CPU/memory exhaustion). This vulnerability is fixed in 0.35.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Yhirose | Cpp-Httplib | < 0.35.0 |
Related Weaknesses (CWE)
References
- https://github.com/yhirose/cpp-httplib/commit/c99d7472b5cf4869d3897b9afc9792063aPatch
- https://github.com/yhirose/cpp-httplib/security/advisories/GHSA-xvfx-w463-6fppExploitMitigationVendor Advisory
FAQ
What is CVE-2026-28435?
CVE-2026-28435 is a vulnerability with a CVSS score of 7.5 (HIGH). cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.35.0, cpp-httplib (httplib.h) does not enforce Server::set_payload_max_length() on the decompressed request...
How severe is CVE-2026-28435?
CVE-2026-28435 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-28435?
Check the references section above for vendor advisories and patch information. Affected products include: Yhirose Cpp-Httplib.