EUVD-2025-201454

| CVE-2025-66577 MEDIUM
2025-12-05 [email protected]
5.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None

Lifecycle Timeline

5
EUVD ID Assigned
Mar 15, 2026 - 17:08 euvd
EUVD-2025-201454
Analysis Generated
Mar 15, 2026 - 17:08 vuln.today
Patch Released
Mar 15, 2026 - 17:08 nvd
Patch available
PoC Detected
Dec 11, 2025 - 18:09 vuln.today
Public exploit code
CVE Published
Dec 05, 2025 - 19:15 nvd
MEDIUM 5.3

Description

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.27.0, a vulnerability allows attacker-controlled HTTP headers to influence server-visible metadata, logging, and authorization decisions. An attacker can supply X-Forwarded-For or X-Real-IP headers which get accepted unconditionally by get_client_ip() in docker/main.cc, causing access and error logs (nginx_access_logger / nginx_error_logger) to record spoofed client IPs (log poisoning / audit evasion). This vulnerability is fixed in 0.27.0.

Analysis

A security vulnerability in cpp-httplib (CVSS 5.3) that allows attacker-controlled http headers. Risk factors: public PoC available. Vendor patch is available.

Technical Context

Vulnerability type not specified by vendor. Affects cpp-httplib.

Affected Products

['cpp-httplib']

Remediation

Apply the vendor-supplied patch immediately.

Priority Score

47
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +26
POC: +20

Vendor Status

Ubuntu

Priority: Medium
cpp-httplib
Release Status Version
upstream released 0.27.0
jammy released 0.10.3+ds-1ubuntu0.1~esm1
noble released 0.14.3+ds-1.1ubuntu0.1~esm1
plucky released 0.18.7-1ubuntu0.25.04.1
questing released 0.18.7-1ubuntu0.25.10.1

Debian

Bug #1122027
cpp-httplib
Release Status Fixed Version Urgency
bookworm vulnerable 0.11.4+ds-1+deb12u1 -
forky, sid, trixie vulnerable 0.18.7-1 -
(unstable) fixed (unfixed) -

Share

EUVD-2025-201454 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy