← Back to CVEs
CVE-2026-33129
MEDIUM5.9
Description
H3 is a minimal H(TTP) framework. Versions 2.0.1-beta.0 through 2.0.0-rc.8 contain a Timing Side-Channel vulnerability in the requireBasicAuth function due to the use of unsafe string comparison (!==). This allows an attacker to deduce the valid password character-by-character by measuring the server's response time, effectively bypassing password complexity protections. This issue is fixed in version 2.0.1-rc.9.
CVE Details
CVSS v3.1 Score5.9
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredNONE
User InteractionNONE
Published3/20/2026
Last Modified3/20/2026
Sourcenvd
Honeypot Sightings0
Affected Products
h3:h3
Weaknesses (CWE)
CWE-208
References
https://github.com/h3js/h3/pull/1283(security-advisories@github.com)
https://github.com/h3js/h3/releases/tag/v2.0.1-rc.9(security-advisories@github.com)
https://github.com/h3js/h3/security/advisories/GHSA-26f5-8h2x-34xh(security-advisories@github.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.