7.5 CVE-2026-31870

Enriched by CISA Exploit
 

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.1, when a cpp-httplib client uses the streaming API (httplib::stream::Get, httplib::stream::Post, etc.), the library calls std::stoull() directly on the Content-Length header value received from the server with no input validation and no exception handling. std::stoull throws std::invalid_argument for non-numeric strings and std::out_of_range for values exceeding ULLONG_MAX. Since nothing catches these exceptions, the C++ runtime calls std::terminate(), which kills the process with SIGABRT. Any server the client connects to — including servers reached via HTTP redirects, third-party APIs, or man-in-the-middle positions can crash the client application with a single HTTP response. No authentication is required. No interaction from the end user is required. The crash is deterministic and immediate. This vulnerability is fixed in 0.37.1.
https://nvd.nist.gov/vuln/detail/CVE-2026-31870

Categories

CWE-248 : Uncaught Exception
When an exception is not caught, it may cause the program to crash or expose sensitive information.

References

security-advisories@github.com Exploit


 

AFFECTED (from MITRE)


Vendor Product Versions
yhirose cpp-httplib
  • < 0.37.1 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end
Configuration 1
cpe:2.3:a:yhirose:cpp-httplib:*:*:*:*:*:*:*:* < 0.37.1


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
https://github.com/yhirose/cpp-httplib/security/advisories/GHSA-39q5-hh6x-jpxx


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry