CVE-2026-1467

A flaw was found in libsoup, an HTTP client library. This vulnerability, known as CRLF (Carriage Return Line Feed) Injection, occurs when an HTTP proxy is configured and the library improperly handles URL-decoded input used to create the Host header. A remote attacker can exploit this by providing a specially crafted URL containing CRLF sequences, allowing them to inject additional HTTP headers or complete HTTP request bodies. This can lead to unintended or unauthorized HTTP requests being forwarded by the proxy, potentially impacting downstream services.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2026-1467 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2433174 Issue Tracking Third Party Advisory
https://gitlab.gnome.org/GNOME/libsoup/-/issues/488 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnome:libsoup:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-27 10:15

Updated : 2026-03-25 14:20


NVD link : CVE-2026-1467

Mitre link : CVE-2026-1467

CVE.ORG link : CVE-2026-1467


JSON object : View

Products Affected

gnome

  • libsoup

redhat

  • enterprise_linux
CWE
CWE-93

Improper Neutralization of CRLF Sequences ('CRLF Injection')