CVE-2026-3633

A flaw was found in libsoup. A remote attacker, by controlling the method parameter of the `soup_message_new()` function, could inject arbitrary headers and additional request data. This vulnerability, known as CRLF (Carriage Return Line Feed) injection, occurs because the method value is not properly escaped during request line construction, potentially leading to HTTP request injection.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2026-3633 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2445128 Issue Tracking Vendor Advisory
https://gitlab.gnome.org/GNOME/libsoup/-/issues/484 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnome:libsoup:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-17 10:16

Updated : 2026-03-19 19:53


NVD link : CVE-2026-3633

Mitre link : CVE-2026-3633

CVE.ORG link : CVE-2026-3633


JSON object : View

Products Affected

gnome

  • libsoup

redhat

  • enterprise_linux
CWE
CWE-93

Improper Neutralization of CRLF Sequences ('CRLF Injection')