Vulnerability Description
TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to version 2.03, an integer overflow vulnerability in the string-to-integer conversion routine (_Val) allows an unauthenticated remote attacker to bypass Content-Length restrictions and perform HTTP Request Smuggling. This can lead to unauthorized access, security filter bypass, and potential cache poisoning. The impact is critical for servers using persistent connections (Keep-Alive). This issue has been patched in version 2.03.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ritlabs | Tinyweb | < 2.03 |
Related Weaknesses (CWE)
References
- https://github.com/maximmasiutin/TinyWeb/commit/d2edd0322c3d74beee0a6c0191299b89Patch
- https://github.com/maximmasiutin/TinyWeb/security/advisories/GHSA-rp8j-cx7r-mw9fExploitVendor Advisory
FAQ
What is CVE-2026-28497?
CVE-2026-28497 is a vulnerability with a CVSS score of 9.1 (CRITICAL). TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to version 2.03, an integer overflow vulnerability in the string-to-integer conversion routine (_Val) allows an unauthenticated...
How severe is CVE-2026-28497?
CVE-2026-28497 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-28497?
Check the references section above for vendor advisories and patch information. Affected products include: Ritlabs Tinyweb.