CVE-2026-1990

3.3 LOW

📋 TL;DR

A null pointer dereference vulnerability in oatpp versions up to 1.3.1 allows local attackers to cause denial of service through application crashes. This affects systems running vulnerable oatpp-based applications where an attacker has local access to trigger the flaw.

💻 Affected Systems

Products:
  • oatpp
Versions: up to and including 1.3.1
Operating Systems: All platforms running oatpp
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations using vulnerable oatpp versions are affected. The vulnerability is in the core framework code.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Application crash leading to denial of service, potentially disrupting services that depend on the oatpp framework.

🟠

Likely Case

Local denial of service through application crashes when malicious input triggers the null pointer dereference.

🟢

If Mitigated

Minimal impact if proper input validation and error handling are implemented, though the underlying vulnerability remains.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Local attackers with access to vulnerable systems can cause denial of service.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit has been publicly disclosed and requires local access. The vulnerability is straightforward to trigger once local access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Monitor oatpp GitHub repository for patches. 2. Apply official patch when available. 3. Restart affected services after patching.

🔧 Temporary Workarounds

Implement input validation

all

Add additional input validation and null checks in application code that uses oatpp::data::type::ObjectWrapper

Restrict local access

all

Implement strict access controls to limit local users who can interact with oatpp applications

🧯 If You Can't Patch

  • Implement network segmentation to limit access to oatpp applications
  • Deploy monitoring for application crashes and restart services automatically

🔍 How to Verify

Check if Vulnerable:

Check oatpp version in your application dependencies or build configuration. If version is 1.3.1 or earlier, you are vulnerable.

Check Version:

Check your project's dependency files (CMakeLists.txt, package.json, etc.) for oatpp version

Verify Fix Applied:

Verify oatpp version is updated beyond 1.3.1 once patch is available.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults
  • Null pointer exception logs
  • Unexpected service restarts

Network Indicators:

  • No network indicators - local exploit only

SIEM Query:

Search for: 'segmentation fault' OR 'null pointer' OR 'oatpp crash' in application logs

🔗 References

📤 Share & Export