CVE-2026-33131
Host Header Spoofing in H3 NodeRequestUrl Enables Middleware Bypass
Publication date: 2026-03-20
Last updated on: 2026-03-20
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| h3 | h3 | 2.0.0 |
| h3 | h3 | 2.0.1 |
| h3 | h3 | 2.0.1 |
| h3 | h3 | 2.0.1 |
| h3 | h3 | 2.0.1 |
| h3 | h3 | 2.0.1 |
| h3 | h3 | 2.0.1 |
| h3 | h3 | 2.0.1 |
| h3 | h3 | 2.0.1 |
| h3 | h3 | 2.0.1 |
| h3 | h3 | 2.0.1 |
| h3 | h3 | 2.0.1 |
| h3 | h3 | 2.0.1 |
| h3 | h3 | 2.0.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-290 | This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-33131 is a vulnerability in the H3 framework (versions 2.0.0-0 through 2.0.1-rc.14) that allows attackers to bypass middleware protections by spoofing the HTTP Host header.'}, {'type': 'paragraph', 'content': "The issue arises because the event.url property in H3 is constructed using untrusted data from the Host header. When middleware accesses event.url or its properties, the URL is lazily built from this untrusted Host header. Since H3's router resolves the route handler before middleware runs, an attacker can craft a Host header that causes middleware checks (such as authentication or authorization) to fail while still matching the route handler, effectively bypassing security controls."}, {'type': 'paragraph', 'content': 'This vulnerability affects any application built on H3 (including Nitro/Nuxt) that accesses event.url properties in middleware guarding sensitive routes. It requires an immediate fix, which is included in version 2.0.1-rc.15.'}] [1]
How can this vulnerability impact me? :
This vulnerability can have serious impacts including unauthorized access to restricted routes by bypassing middleware protections such as authentication and authorization.
An attacker can send specially crafted requests with manipulated Host headers to gain access to sensitive internal endpoints without proper credentials.
The CVSS v3.1 score of 7.4 indicates high severity, with high impact on confidentiality and integrity, meaning attackers could access or modify sensitive data. However, availability is not affected.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring HTTP requests for suspicious or malformed Host headers that attempt to manipulate the event.url property in the H3 framework.'}, {'type': 'paragraph', 'content': 'Specifically, look for requests with crafted Host headers similar to "localhost:3000/abchehe?" which are used to bypass middleware protections.'}, {'type': 'paragraph', 'content': 'You can use network monitoring or web server logs to identify such requests.'}, {'type': 'paragraph', 'content': 'Example commands to detect suspicious Host headers in logs might include:'}, {'type': 'list_item', 'content': "Using grep on access logs to find unusual Host headers: grep -i 'Host: localhost:3000/abchehe?' /var/log/nginx/access.log"}, {'type': 'list_item', 'content': "Using tcpdump to capture HTTP traffic and filter for suspicious Host headers: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'Host:'"}, {'type': 'list_item', 'content': "Using curl to test if your system is vulnerable by sending a crafted Host header: curl -H 'Host: localhost:3000/abchehe?' http://yourserver/internal/run -v"}] [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade the H3 framework to version 2.0.1-rc.15 or later, where the vulnerability has been patched.
This patch fixes the unsafe construction of FastURL.href from unsanitized, attacker-controlled Host header input.
Until the upgrade can be applied, consider implementing additional validation or sanitization of the Host header in your middleware to prevent spoofing.
Also, review your middleware logic to ensure it does not rely solely on event.url properties that can be manipulated by untrusted input.