CVE-2026-33131
Received Received - Intake
Host Header Spoofing in H3 NodeRequestUrl Enables Middleware Bypass

Publication date: 2026-03-20

Last updated on: 2026-03-20

Assigner: GitHub, Inc.

Description
H3 is a minimal H(TTP) framework. Versions 2.0.0-0 through 2.0.1-rc.14 contain a Host header spoofing vulnerability in the NodeRequestUrl (which extends FastURL) which allows middleware bypass. When event.url, event.url.hostname, or event.url._url is accessed, such as in a logging middleware, the _url getter constructs a URL from untrusted data, including the user-controlled Host header. Because H3's router resolves the route handler before middleware runs, an attacker can supply a crafted Host header (e.g., Host: localhost:3000/abchehe?) to make the middleware path check fail while the route handler still matches, effectively bypassing authentication or authorization middleware. This affects any application built on H3 (including Nitro/Nuxt) that accesses event.url properties in middleware guarding sensitive routes. The issue requires an immediate fix to prevent FastURL.href from being constructed with unsanitized, attacker-controlled input. Version 2.0.1-rc.15 contains a patch for this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-20
Last Modified
2026-03-20
Generated
2026-05-07
AI Q&A
2026-03-20
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 14 associated CPEs
Vendor Product Version / Range
h3 h3 2.0.0
h3 h3 2.0.1
h3 h3 2.0.1
h3 h3 2.0.1
h3 h3 2.0.1
h3 h3 2.0.1
h3 h3 2.0.1
h3 h3 2.0.1
h3 h3 2.0.1
h3 h3 2.0.1
h3 h3 2.0.1
h3 h3 2.0.1
h3 h3 2.0.1
h3 h3 2.0.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-290 This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-33131 is a vulnerability in the H3 framework (versions 2.0.0-0 through 2.0.1-rc.14) that allows attackers to bypass middleware protections by spoofing the HTTP Host header.'}, {'type': 'paragraph', 'content': "The issue arises because the event.url property in H3 is constructed using untrusted data from the Host header. When middleware accesses event.url or its properties, the URL is lazily built from this untrusted Host header. Since H3's router resolves the route handler before middleware runs, an attacker can craft a Host header that causes middleware checks (such as authentication or authorization) to fail while still matching the route handler, effectively bypassing security controls."}, {'type': 'paragraph', 'content': 'This vulnerability affects any application built on H3 (including Nitro/Nuxt) that accesses event.url properties in middleware guarding sensitive routes. It requires an immediate fix, which is included in version 2.0.1-rc.15.'}] [1]


How can this vulnerability impact me? :

This vulnerability can have serious impacts including unauthorized access to restricted routes by bypassing middleware protections such as authentication and authorization.

An attacker can send specially crafted requests with manipulated Host headers to gain access to sensitive internal endpoints without proper credentials.

The CVSS v3.1 score of 7.4 indicates high severity, with high impact on confidentiality and integrity, meaning attackers could access or modify sensitive data. However, availability is not affected.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring HTTP requests for suspicious or malformed Host headers that attempt to manipulate the event.url property in the H3 framework.'}, {'type': 'paragraph', 'content': 'Specifically, look for requests with crafted Host headers similar to "localhost:3000/abchehe?" which are used to bypass middleware protections.'}, {'type': 'paragraph', 'content': 'You can use network monitoring or web server logs to identify such requests.'}, {'type': 'paragraph', 'content': 'Example commands to detect suspicious Host headers in logs might include:'}, {'type': 'list_item', 'content': "Using grep on access logs to find unusual Host headers: grep -i 'Host: localhost:3000/abchehe?' /var/log/nginx/access.log"}, {'type': 'list_item', 'content': "Using tcpdump to capture HTTP traffic and filter for suspicious Host headers: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'Host:'"}, {'type': 'list_item', 'content': "Using curl to test if your system is vulnerable by sending a crafted Host header: curl -H 'Host: localhost:3000/abchehe?' http://yourserver/internal/run -v"}] [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the H3 framework to version 2.0.1-rc.15 or later, where the vulnerability has been patched.

This patch fixes the unsafe construction of FastURL.href from unsanitized, attacker-controlled Host header input.

Until the upgrade can be applied, consider implementing additional validation or sanitization of the Host header in your middleware to prevent spoofing.

Also, review your middleware logic to ensure it does not rely solely on event.url properties that can be manipulated by untrusted input.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart