Ad

CVE-2026-1801

MEDIUM CVSS 3.1: 5.3 EPSS 0.04%
Updated Mar 19, 2026
libsoup
Parameter Value
CVSS 5.3 (MEDIUM)
Type CWE-444
Vendor libsoup
Public PoC No

A flaw was found in libsoup, an HTTP client/server library. This HTTP Request Smuggling vulnerability arises from non-RFC-compliant parsing in the soup_filter_input_stream_read_line() logic, where libsoup accepts malformed chunk headers, such as lone line feed (LF) characters instead of the required carriage return and line feed (CRLF). A remote attacker can exploit this without authentication or user interaction by sending specially crafted chunked requests.

This allows libsoup to parse and process multiple HTTP requests from a single network message, potentially leading to information disclosure.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
None
No data leak
Integrity
Low
Partial data modification
Availability
None
No disruption

CVSS Vector v3.1

Weakness Type (CWE)