Static Web Server affected by timing-based username enumeration in Basic Authentication due to early response on invalid usernames
Moderate severity
GitHub Reviewed
Published
Feb 20, 2026
in
static-web-server/static-web-server
•
Updated Feb 23, 2026
Description
Published to the GitHub Advisory Database
Feb 20, 2026
Reviewed
Feb 20, 2026
Published by the National Vulnerability Database
Feb 21, 2026
Last updated
Feb 23, 2026
Summary
A Timing-based username enumeration in Basic Authentication vulnerability due to early response on invalid usernames could allow attackers to identify valid users and focus their efforts on targeted brute-force or credential-stuffing attacks.
Details
SWS validates the provided username before performing any password verification.
401 Unauthorizedresponse immediately.bcrypt), which introduces a different execution path and measurable timing discrepancy.This allows an attacker to distinguish between existing and non-existing accounts by analyzing response times.
PoC
The following statistical results were obtained by measuring the mean response time over 100 iterations using a custom Rust script:
While the valid user responded faster in this specific test environment, the statistically significant gap confirms that the authentication logic does not execute in constant time.
Impact
Users using the SWS' Basic Authentication feature are primarily impacted.
References