CVE-2026-3632

A flaw was found in libsoup, a library used by applications to send network requests. This vulnerability occurs because libsoup does not properly validate hostnames, allowing special characters to be injected into HTTP headers. A remote attacker could exploit this to perform HTTP smuggling, where they can send hidden, malicious requests alongside legitimate ones. In certain situations, this could lead to Server-Side Request Forgery (SSRF), enabling an attacker to force the server to make unauthorized requests to other internal or external systems. The impact is low, as SoupServer is not actually used in internet infrastructure.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2026-3632 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2445127 Issue Tracking Vendor Advisory
https://gitlab.gnome.org/GNOME/libsoup/-/issues/483 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnome:libsoup:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*

History

19 Mar 2026, 19:56

Type Values Removed Values Added
Summary
  • (es) Se encontró un defecto en libsoup, una biblioteca utilizada por aplicaciones para enviar peticiones de red. Esta vulnerabilidad ocurre porque libsoup no valida correctamente los nombres de host, permitiendo que se inyecten caracteres especiales en las cabeceras HTTP. Un atacante remoto podría explotar esto para realizar contrabando HTTP, donde pueden enviar peticiones ocultas y maliciosas junto con las legítimas. En ciertas situaciones, esto podría llevar a Falsificación de Petición del Lado del Servidor (SSRF), permitiendo a un atacante forzar al servidor a realizar peticiones no autorizadas a otros sistemas internos o externos. El impacto es bajo, ya que SoupServer no se utiliza realmente en la infraestructura de internet.
First Time Redhat
Gnome
Gnome libsoup
Redhat enterprise Linux
References () https://access.redhat.com/security/cve/CVE-2026-3632 - () https://access.redhat.com/security/cve/CVE-2026-3632 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2445127 - () https://bugzilla.redhat.com/show_bug.cgi?id=2445127 - Issue Tracking, Vendor Advisory
References () https://gitlab.gnome.org/GNOME/libsoup/-/issues/483 - () https://gitlab.gnome.org/GNOME/libsoup/-/issues/483 - Exploit, Issue Tracking, Vendor Advisory
CPE cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:gnome:libsoup:-:*:*:*:*:*:*:*

17 Mar 2026, 10:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-17 10:16

Updated : 2026-03-19 19:56


NVD link : CVE-2026-3632

Mitre link : CVE-2026-3632

CVE.ORG link : CVE-2026-3632


JSON object : View

Products Affected

redhat

  • enterprise_linux

gnome

  • libsoup
CWE
CWE-1286

Improper Validation of Syntactic Correctness of Input