CVE-2026-27633
Published: 26 February 2026
Summary
CVE-2026-27633 is a high-severity Uncontrolled Resource Consumption (CWE-400) vulnerability in Ritlabs Tinyweb. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 33.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Limiting concurrent sessions directly prevents uncontrolled resource consumption by capping the number of active sessions per user or account.
Contingency plan testing includes resource exhaustion scenarios to verify recovery, making it harder for attackers to sustain exploits that cause uncontrolled consumption.
Updated contingency plans include current procedures to detect, contain, and recover from resource exhaustion, limiting an attacker's ability to sustain impact from uncontrolled consumption.
Alternate site allows resumption of operations if resource exhaustion at the primary site is exploited to cause unavailability.
Alternate telecommunications services enable resumption of essential functions when primary services become unavailable due to uncontrolled resource consumption.
Planning and coordination of security activities (scans, tests, maintenance) directly imposes scheduling and throttling that prevents those activities from producing uncontrolled resource consumption.
Performance metrics and monitoring inherently track resource consumption patterns, making uncontrolled consumption easier to detect and mitigate.
Terminating idle connections bounds resource consumption that would otherwise allow uncontrolled accumulation of open sessions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables remote unauthenticated exploitation of a public-facing web server (T1190) via a single crafted POST request that triggers application-level resource exhaustion and crash (T1499.004).
NVD Description
TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Versions prior to version 2.02 have a Denial of Service (DoS) vulnerability via memory exhaustion. Unauthenticated remote attackers can send an HTTP POST request to the server with…
more
an exceptionally large `Content-Length` header (e.g., `2147483647`). The server continuously allocates memory for the request body (`EntityBody`) while streaming the payload without enforcing any maximum limit, leading to all available memory being consumed and causing the server to crash. Anyone hosting services using TinyWeb is impacted. Version 2.02 fixes the issue. The patch introduces a `CMaxEntityBodySize` limit (set to 10MB) for the maximum size of accepted payloads. As a temporary workaround if upgrading is not immediately possible, consider placing the server behind a Web Application Firewall (WAF) or reverse proxy (like nginx or Cloudflare) configured to explicitly limit the maximum allowed HTTP request body size (e.g., `client_max_body_size` in nginx).
Deeper analysisAI
CVE-2026-27633 is a Denial of Service (DoS) vulnerability via memory exhaustion in TinyWeb, a web server supporting HTTP and HTTPS written in Delphi for Win32 platforms. Versions prior to 2.02 are affected, as the server fails to enforce a maximum limit on HTTP request body sizes. When processing a POST request, it continuously allocates memory for the EntityBody while streaming the payload, allowing unchecked consumption of all available system memory.
Unauthenticated remote attackers can exploit this vulnerability by sending an HTTP POST request with an exceptionally large Content-Length header, such as 2147483647. This triggers unbounded memory allocation, leading to server crash and denial of service. The CVSS v3.1 base score is 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), with associated CWEs 400 (Uncontrolled Resource Consumption) and 770 (Allocation of Resources Without Limits or Throttling). Any service hosted on affected TinyWeb instances is at risk.
Version 2.02 patches the issue by introducing a CMaxEntityBodySize limit set to 10MB for maximum accepted payloads. If immediate upgrading is not feasible, a temporary workaround is to deploy the server behind a Web Application Firewall (WAF) or reverse proxy like nginx or Cloudflare, explicitly configured to restrict HTTP request body sizes (e.g., client_max_body_size in nginx). Details are provided in the GitHub commit at https://github.com/maximmasiutin/TinyWeb/commit/1cb5a1d, security advisory at https://github.com/maximmasiutin/TinyWeb/security/advisories/GHSA-992w-gmcm-fmgr, and analysis at https://www.masiutin.net/tinyweb-cve-2026-27633.html.
Details
- CWE(s)