CVE-2026-3633

A flaw was found in libsoup. A remote attacker, by controlling the method parameter of the `soup_message_new()` function, could inject arbitrary headers and additional request data. This vulnerability, known as CRLF (Carriage Return Line Feed) injection, occurs because the method value is not properly escaped during request line construction, potentially leading to HTTP request injection.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2026-3633 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2445128 Issue Tracking Vendor Advisory
https://gitlab.gnome.org/GNOME/libsoup/-/issues/484 Exploit Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnome:libsoup:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*

History

19 Mar 2026, 19:53

Type Values Removed Values Added
First Time Redhat
Gnome
Gnome libsoup
Redhat enterprise Linux
References () https://access.redhat.com/security/cve/CVE-2026-3633 - () https://access.redhat.com/security/cve/CVE-2026-3633 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2445128 - () https://bugzilla.redhat.com/show_bug.cgi?id=2445128 - Issue Tracking, Vendor Advisory
References () https://gitlab.gnome.org/GNOME/libsoup/-/issues/484 - () https://gitlab.gnome.org/GNOME/libsoup/-/issues/484 - Exploit, Issue Tracking, Vendor Advisory
Summary
  • (es) Se encontró una falla en libsoup. Un atacante remoto, al controlar el parámetro method de la función 'soup_message_new()', podría inyectar encabezados arbitrarios y datos de solicitud adicionales. Esta vulnerabilidad, conocida como inyección CRLF (Carriage Return Line Feed), ocurre porque el valor del método no se escapa correctamente durante la construcción de la línea de solicitud, lo que podría llevar a la inyección de solicitudes HTTP.
CPE cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:a:gnome:libsoup:-:*:*:*:*:*:*:*

17 Mar 2026, 10:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-17 10:16

Updated : 2026-03-19 19:53


NVD link : CVE-2026-3633

Mitre link : CVE-2026-3633

CVE.ORG link : CVE-2026-3633


JSON object : View

Products Affected

redhat

  • enterprise_linux

gnome

  • libsoup
CWE
CWE-93

Improper Neutralization of CRLF Sequences ('CRLF Injection')