A flaw was found in libsoup. A remote attacker, by controlling the method parameter of the `soup_message_new()` function, could inject arbitrary headers and additional request data. This vulnerability, known as CRLF (Carriage Return Line Feed) injection, occurs because the method value is not properly escaped during request line construction, potentially leading to HTTP request injection.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2026-3633 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2445128 | Issue Tracking Vendor Advisory |
| https://gitlab.gnome.org/GNOME/libsoup/-/issues/484 | Exploit Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
19 Mar 2026, 19:53
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Redhat
Gnome Gnome libsoup Redhat enterprise Linux |
|
| References | () https://access.redhat.com/security/cve/CVE-2026-3633 - Vendor Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2445128 - Issue Tracking, Vendor Advisory | |
| References | () https://gitlab.gnome.org/GNOME/libsoup/-/issues/484 - Exploit, Issue Tracking, Vendor Advisory | |
| Summary |
|
|
| CPE | cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:a:gnome:libsoup:-:*:*:*:*:*:*:* |
17 Mar 2026, 10:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-17 10:16
Updated : 2026-03-19 19:53
NVD link : CVE-2026-3633
Mitre link : CVE-2026-3633
CVE.ORG link : CVE-2026-3633
JSON object : View
Products Affected
redhat
- enterprise_linux
gnome
- libsoup
CWE
CWE-93
Improper Neutralization of CRLF Sequences ('CRLF Injection')
