Ad

CVE-2026-34715

MEDIUM CVSS 3.1: 5.3 EPSS 0.04%
Updated Apr 10, 2026
Vshakitskiy
Parameter Value
CVSS 5.3 (MEDIUM)
Affected Versions before 3.0.6
Fixed In 3.0.6
Type CWE-113
Vendor Vshakitskiy
Public PoC No

ewe is a Gleam web server. Prior to version 3.0.6, the encode_headers function in src/ewe/internal/encoder.gleam directly interpolates response header keys and values into raw HTTP bytes without validating or stripping CRLF (\r\n) sequences. An application that passes user-controlled data into response headers (e.g., setting a Location redirect header from a request parameter) allows an attacker to inject arbitrary HTTP response content, leading to response splitting, cache poisoning, and possible cross-site scripting.

Notably, ewe does validate CRLF in incoming request headers via validate_field_value() in the HTTP/1.1 parser — but provides no equivalent protection for outgoing response headers in the encoder. This issue has been patched in version 3.0.6.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
None
No data leak
Integrity
Low
Partial data modification
Availability
None
No disruption

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Vshakitskiy Ewe
cpe:2.3:a:vshakitskiy:ewe:*:*:*:*:*:*:*:*
3.0.6