CVE-2026-3632
Received Received - Intake
HTTP Smuggling in Libsoup Due to Improper Hostname Validation

Publication date: 2026-03-17

Last updated on: 2026-03-19

Assigner: Red Hat, Inc.

Description
A flaw was found in libsoup, a library used by applications to send network requests. This vulnerability occurs because libsoup does not properly validate hostnames, allowing special characters to be injected into HTTP headers. A remote attacker could exploit this to perform HTTP smuggling, where they can send hidden, malicious requests alongside legitimate ones. In certain situations, this could lead to Server-Side Request Forgery (SSRF), enabling an attacker to force the server to make unauthorized requests to other internal or external systems. The impact is low, as SoupServer is not actually used in internet infrastructure.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-17
Last Modified
2026-03-19
Generated
2026-05-07
AI Q&A
2026-03-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
redhat enterprise_linux 7.0
redhat enterprise_linux 6.0
redhat enterprise_linux 8.0
redhat enterprise_linux 9.0
redhat enterprise_linux 10.0
gnome libsoup *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1286 The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in libsoup, a GNOME HTTP client/server library used by applications to send network requests. The flaw occurs because libsoup does not properly validate hostnames when setting the HTTP Host header, allowing special characters such as carriage return and line feed (CRLF) to be injected.

An attacker can exploit this by crafting a malicious URI that injects additional HTTP headers or even entire HTTP requests into a single request, a technique known as HTTP request smuggling.

This can lead to Server-Side Request Forgery (SSRF), where the attacker forces the server to make unauthorized requests to internal or external systems.


How can this vulnerability impact me? :

The vulnerability can cause unexpected HTTP requests, such as POST requests, to be sent in contexts where only safe read operations are expected.

For example, applications like LibreOffice that use libsoup via GIO and GVfs to read remote resources could be tricked into sending attacker-controlled POST requests by opening malicious documents.

This can lead to SSRF attacks, potentially compromising web applications or internal systems, especially on headless servers running document conversion services.

However, the overall impact is considered low because the affected SoupServer component is not widely used in internet infrastructure.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring HTTP requests for unusual or malformed Host headers containing special characters such as carriage return (\\r) and line feed (\\n) sequences that are normally invalid in hostnames.'}, {'type': 'paragraph', 'content': 'One way to detect exploitation attempts is to capture and inspect HTTP traffic for injected CRLF sequences in the Host header, which may indicate HTTP request smuggling.'}, {'type': 'paragraph', 'content': 'For example, using network packet capture tools like tcpdump or Wireshark, you can filter HTTP traffic and look for suspicious Host headers.'}, {'type': 'list_item', 'content': "tcpdump -A -s 0 'tcp port 80 or tcp port 443' | grep -i 'Host:'"}, {'type': 'list_item', 'content': 'Use Wireshark to filter HTTP requests and inspect Host headers for CRLF or encoded characters such as %0d%0a.'}, {'type': 'paragraph', 'content': 'Additionally, reviewing application logs for unexpected POST requests or unusual HTTP methods triggered by malformed URIs may help identify exploitation attempts.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include validating and sanitizing hostname components before they are used to set HTTP Host headers to ensure they do not contain invalid characters such as CRLF sequences.

Ensure that libsoup or any application using it implements stricter validation on header values to prevent injection of special characters that enable HTTP request smuggling.

If possible, update libsoup to a version where this vulnerability is fixed or apply patches provided by the vendor.

As a temporary measure, monitor and block suspicious HTTP requests with malformed Host headers at the network perimeter or web server level.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart