CVE-2026-3632
low-risk
Published 2026-03-17
A flaw was found in libsoup, a library used by applications to send network requests. This vulnerability occurs because libsoup does not properly validate hostnames, allowing special characters to be injected into HTTP headers. A remote attacker could exploit this to perform HTTP smuggling, where they can send hidden, malicious requests alongside legitimate ones. In certain situations, this could lead to Server-Side Request Forgery (SSRF), enabling an attacker to force the server to make unauthorized requests to other internal or external systems. The impact is low, as SoupServer is not actually used in internet infrastructure.
Do I need to act?
-
0.11% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.9/10
Low
NETWORK
/ HIGH complexity
Affected Products (6)
References (3)
Vendor Advisory
https://access.redhat.com/security/cve/CVE-2026-3632
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2445127
26
/ 100
low-risk
Severity
13/34 · Low
Exploitability
0/34 · Minimal
Exposure
13/34 · Low