TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to version 2.03, an integer overflow vulnerability in the string-to-integer conversion routine (_Val) allows an unauthenticated remote attacker to bypass Content-Length restrictions and perform HTTP Request Smuggling. This can lead to unauthorized access, security filter bypass, and potential cache poisoning. The impact is critical for servers using persistent connections (Keep-Alive). This issue has been patched in version 2.03.
References
| Link | Resource |
|---|---|
| https://github.com/maximmasiutin/TinyWeb/commit/d2edd0322c3d74beee0a6c0191299b8946695d4e | Patch |
| https://github.com/maximmasiutin/TinyWeb/security/advisories/GHSA-rp8j-cx7r-mw9f | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-03-06 04:16
Updated : 2026-03-16 15:37
NVD link : CVE-2026-28497
Mitre link : CVE-2026-28497
CVE.ORG link : CVE-2026-28497
JSON object : View
Products Affected
ritlabs
- tinyweb
