A flaw was found in libsoup. A remote attacker, by controlling the method parameter of the `soup_message_new()` function, could inject arbitrary headers and additional request data. This vulnerability, known as CRLF (Carriage Return Line Feed) injection, occurs because the method value is not properly escaped during request line construction, potentially leading to HTTP request injection.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-3633 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2445128 | Issue Tracking Vendor Advisory |
| https://gitlab.gnome.org/GNOME/libsoup/-/issues/484 | Exploit Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-17 10:16
Updated : 2026-03-19 19:53
NVD link : CVE-2026-3633
Mitre link : CVE-2026-3633
CVE.ORG link : CVE-2026-3633
JSON object : View
Products Affected
gnome
- libsoup
redhat
- enterprise_linux
CWE
CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')
