Cyber Posture

CVE-2026-33745

HighPublic PoC

Published: 27 March 2026

Published
27 March 2026
Modified
01 April 2026
KEV Added
Patch
CVSS Score 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0006 19.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33745 is a high-severity Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) vulnerability in Yhirose Cpp-Httplib. Its CVSS base score is 7.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Steal Application Access Token (T1528); ranked at the 19.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What attackers do: exploitation maps to Steal Application Access Token (T1528). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely identification, reporting, and remediation of flaws such as CVE-2026-33745 in cpp-httplib to prevent credential leakage to arbitrary hosts via cross-origin redirects.

detect

RA-5 uses vulnerability scanning to detect deployments of vulnerable cpp-httplib versions affected by CVE-2026-33745 before exploitation occurs.

detect

SI-5 ensures receipt and implementation of security advisories like GHSA-6hrp-7fq9-3qv2 for CVE-2026-33745, prompting patching of the credential-forwarding flaw.

MITRE ATT&CK Enterprise TechniquesAI

T1528 Steal Application Access Token Credential Access
Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.
Why these techniques?

The vulnerability directly enables theft of application access tokens and other HTTP credentials (Basic Auth, Bearer, Digest) by leaking Authorization headers to attacker-controlled hosts during cross-origin redirects.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.39.0, the cpp-httplib HTTP client forwards stored Basic Auth, Bearer Token, and Digest Auth credentials to arbitrary hosts when following cross-origin HTTP redirects (301/302/307/308). A malicious or compromised…

more

server can redirect the client to an attacker-controlled host, which then receives the plaintext credentials in the `Authorization` header. Version 0.39.0 fixes the issue.

Deeper analysisAI

CVE-2026-33745 affects cpp-httplib, a C++11 single-file header-only cross-platform HTTP/HTTPS library, in versions prior to 0.39.0. The vulnerability resides in the HTTP client, which inadvertently forwards stored Basic Auth, Bearer Token, and Digest Auth credentials to arbitrary hosts during cross-origin HTTP redirects (status codes 301, 302, 307, or 308). This exposure allows credentials embedded in the Authorization header to be leaked to unintended destinations.

Remote attackers can exploit this issue by controlling or compromising a server that issues a redirect to the client. When the cpp-httplib client follows the redirect, it sends the plaintext credentials to the attacker's host, enabling credential theft. The attack requires high complexity due to the need for precise redirect control but requires no privileges or user interaction from the victim.

The GitHub security advisory (GHSA-6hrp-7fq9-3qv2) confirms that upgrading to version 0.39.0 resolves the issue by preventing the forwarding of credentials across origins during redirects. Practitioners should audit dependencies using cpp-httplib and apply the patch promptly.

Details

CWE(s)

Affected Products

yhirose
cpp-httplib
≤ 0.39.0

CVEs Like This One

CVE-2026-32627Same product: Yhirose Cpp-Httplib
CVE-2026-22776Same product: Yhirose Cpp-Httplib
CVE-2025-53628Same product: Yhirose Cpp-Httplib
CVE-2026-28435Same product: Yhirose Cpp-Httplib
CVE-2026-21428Same product: Yhirose Cpp-Httplib
CVE-2026-31870Same product: Yhirose Cpp-Httplib
CVE-2025-21620Shared CWE-200
CVE-2026-40895Shared CWE-200
CVE-2026-33180Shared CWE-200
CVE-2026-34969Shared CWE-200

References