Home

Description

ewe is a Gleam web server. Prior to version 3.0.6, the encode_headers function in src/ewe/internal/encoder.gleam directly interpolates response header keys and values into raw HTTP bytes without validating or stripping CRLF (\r\n) sequences. An application that passes user-controlled data into response headers (e.g., setting a Location redirect header from a request parameter) allows an attacker to inject arbitrary HTTP response content, leading to response splitting, cache poisoning, and possible cross-site scripting. Notably, ewe does validate CRLF in incoming request headers via validate_field_value() in the HTTP/1.1 parser — but provides no equivalent protection for outgoing response headers in the encoder. This issue has been patched in version 3.0.6.

PUBLISHED Reserved 2026-03-30 | Published 2026-04-02 | Updated 2026-04-03 | Assigner GitHub_M




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

Product status

< 3.0.6
affected

References

github.com/...iy/ewe/security/advisories/GHSA-x2w3-23jr-hrpf exploit

github.com/...iy/ewe/security/advisories/GHSA-x2w3-23jr-hrpf

github.com/...ommit/ce4ff214d32626a10fda9398dc94a2d720e17446

github.com/vshakitskiy/ewe/releases/tag/v3.0.6

cve.org (CVE-2026-34715)

nvd.nist.gov (CVE-2026-34715)

Download JSON