Home

Description

A request smuggling vulnerability exists in libsoup's HTTP/1 header parsing logic. The soup_message_headers_append_common() function in libsoup/soup-message-headers.c unconditionally appends each header value without validating for duplicate or conflicting Content-Length fields. This allows an attacker to send HTTP requests containing multiple Content-Length headers with differing values.

PUBLISHED Reserved 2026-02-18 | Published 2026-04-23 | Updated 2026-04-24 | Assigner redhat




LOW: 3.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

Product status

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2026-02-18:Reported to Red Hat.
2026-02-18:Made public.

Credits

Red Hat would like to thank Cavid for reporting this issue.

References

access.redhat.com/security/cve/CVE-2026-2708 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2440743 (RHBZ#2440743) issue-tracking

gitlab.gnome.org/GNOME/libsoup/-/issues/500

gitlab.gnome.org/GNOME/libsoup/-/merge_requests/513

cve.org (CVE-2026-2708)

nvd.nist.gov (CVE-2026-2708)

Download JSON