← Back to CVEs
CVE-2026-3632
LOW3.9
Description
A flaw was found in libsoup, a library used by applications to send network requests. This vulnerability occurs because libsoup does not properly validate hostnames, allowing special characters to be injected into HTTP headers. A remote attacker could exploit this to perform HTTP smuggling, where they can send hidden, malicious requests alongside legitimate ones. In certain situations, this could lead to Server-Side Request Forgery (SSRF), enabling an attacker to force the server to make unauthorized requests to other internal or external systems. The impact is low, as SoupServer is not actually used in internet infrastructure.
CVE Details
CVSS v3.1 Score3.9
SeverityLOW
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredHIGH
User InteractionREQUIRED
Published3/17/2026
Last Modified3/19/2026
Sourcenvd
Honeypot Sightings0
Affected Products
gnome:libsoupredhat:enterprise_linux
Weaknesses (CWE)
CWE-1286
References
https://access.redhat.com/security/cve/CVE-2026-3632(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2445127(secalert@redhat.com)
https://gitlab.gnome.org/GNOME/libsoup/-/issues/483(secalert@redhat.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.