{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T21:47:05.048","vulnerabilities":[{"cve":{"id":"CVE-2025-52887","sourceIdentifier":"security-advisories@github.com","published":"2025-06-26T15:15:23.350","lastModified":"2025-08-06T19:15:01.753","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. In version 0.21.0, when many http headers fields are passed in, the library does not limit the number of headers, and the memory associated with the headers will not be released when the connection is disconnected. This leads to potential exhaustion of system memory and results in a server crash or unresponsiveness. Version 0.22.0 contains a patch for the issue."},{"lang":"es","value":"cpp-httplib es una librería HTTP/HTTPS multiplataforma de un solo archivo de encabezados de C++11. En la versión 0.21.0, al pasar muchos campos de encabezados HTTP, la biblioteca no limita el número de encabezados y la memoria asociada no se libera al desconectarse la conexión. Esto puede agotar la memoria del sistema y provocar un fallo del servidor o la falta de respuesta. La versión 0.22.0 incluye un parche para este problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:yhirose:cpp-httplib:0.21.0:*:*:*:*:*:*:*","matchCriteriaId":"A23CB224-2774-4E6A-918D-01589E8E7CF0"}]}]}],"references":[{"url":"https://github.com/yhirose/cpp-httplib/commit/28dcf379e82a2cdb544d812696a7fd46067eb7f9","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/yhirose/cpp-httplib/security/advisories/GHSA-xjhg-gf59-p92h","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}