Request Smuggling Vulnerability in libsoup HTTP/1 Header Parsing by GNOME
CVE-2026-2708

3.7LOW

What is CVE-2026-2708?

A request smuggling vulnerability has been identified in the HTTP/1 header parsing logic of libsoup. The issue arises from the soup_message_headers_append_common() function, which appends each header value without adequately validating for duplicate or conflicting Content-Length fields. This oversight allows malicious actors to craft HTTP requests with multiple Content-Length headers that have differing values, potentially manipulating the way a server processes these requests. As a result, this vulnerability can lead to serious security implications in web applications utilizing the affected version of libsoup.

References

CVSS V3.1

Score:
3.7
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Cavid for reporting this issue.
.