CVE-2026-1467

A flaw was found in libsoup, an HTTP client library. This vulnerability, known as CRLF (Carriage Return Line Feed) Injection, occurs when an HTTP proxy is configured and the library improperly handles URL-decoded input used to create the Host header. A remote attacker can exploit this by providing a specially crafted URL containing CRLF sequences, allowing them to inject additional HTTP headers or complete HTTP request bodies. This can lead to unintended or unauthorized HTTP requests being forwarded by the proxy, potentially impacting downstream services.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2026-1467 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2433174 Issue Tracking Third Party Advisory
https://gitlab.gnome.org/GNOME/libsoup/-/issues/488 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnome:libsoup:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*

History

25 Mar 2026, 14:20

Type Values Removed Values Added
CPE cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:gnome:libsoup:-:*:*:*:*:*:*:*
First Time Redhat
Gnome
Gnome libsoup
Redhat enterprise Linux
References () https://access.redhat.com/security/cve/CVE-2026-1467 - () https://access.redhat.com/security/cve/CVE-2026-1467 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2433174 - () https://bugzilla.redhat.com/show_bug.cgi?id=2433174 - Issue Tracking, Third Party Advisory
References () https://gitlab.gnome.org/GNOME/libsoup/-/issues/488 - () https://gitlab.gnome.org/GNOME/libsoup/-/issues/488 - Exploit, Issue Tracking, Vendor Advisory

19 Mar 2026, 15:16

Type Values Removed Values Added
Summary
  • (es) Se encontró una falla en libsoup, una biblioteca cliente HTTP. Esta vulnerabilidad, conocida como inyección CRLF (Carriage Return Line Feed), ocurre cuando se configura un proxy HTTP y la biblioteca maneja incorrectamente la entrada decodificada de URL utilizada para crear el encabezado Host. Un atacante remoto puede explotar esto al proporcionar una URL especialmente diseñada que contiene secuencias CRLF, permitiéndoles inyectar encabezados HTTP adicionales o cuerpos completos de solicitudes HTTP. Esto puede llevar a que solicitudes HTTP no intencionadas o no autorizadas sean reenviadas por el proxy, afectando potencialmente a los servicios posteriores.
References
  • () https://gitlab.gnome.org/GNOME/libsoup/-/issues/488 -

28 Jan 2026, 15:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.1
v2 : unknown
v3 : 5.8

27 Jan 2026, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-27 10:15

Updated : 2026-03-25 14:20


NVD link : CVE-2026-1467

Mitre link : CVE-2026-1467

CVE.ORG link : CVE-2026-1467


JSON object : View

Products Affected

redhat

  • enterprise_linux

gnome

  • libsoup
CWE
CWE-93

Improper Neutralization of CRLF Sequences ('CRLF Injection')