← Back to CVEs
CVE-2026-3234
MEDIUM4.3
Description
A flaw was found in mod_proxy_cluster. This vulnerability, a Carriage Return Line Feed (CRLF) injection in the decodeenc() function, allows a remote attacker to bypass input validation. By injecting CRLF sequences into the cluster configuration, an attacker can corrupt the response body of INFO endpoint responses. Exploitation requires network access to the MCMP protocol port, but no authentication is needed.
CVE Details
CVSS v3.1 Score4.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack VectorADJACENT_NETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published3/12/2026
Last Modified3/12/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-93
References
https://access.redhat.com/security/cve/CVE-2026-3234(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2442889(secalert@redhat.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.