Home

Description

A flaw was found in libsoup, an HTTP client/server library. This HTTP Request Smuggling vulnerability arises from non-RFC-compliant parsing in the soup_filter_input_stream_read_line() logic, where libsoup accepts malformed chunk headers, such as lone line feed (LF) characters instead of the required carriage return and line feed (CRLF). A remote attacker can exploit this without authentication or user interaction by sending specially crafted chunked requests. This allows libsoup to parse and process multiple HTTP requests from a single network message, potentially leading to information disclosure.

PUBLISHED Reserved 2026-02-03 | Published 2026-02-03 | Updated 2026-02-03 | Assigner redhat




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

Product status

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2026-02-03:Reported to Red Hat.
2026-02-03:Made public.

Credits

Red Hat would like to thank Ahmed Lekssays for reporting this issue.

References

access.redhat.com/security/cve/CVE-2026-1801 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2436315 (RHBZ#2436315) issue-tracking

cve.org (CVE-2026-1801)

nvd.nist.gov (CVE-2026-1801)

Download JSON