Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1467: Improper Neutralization of CRLF Sequences ('CRLF Injection') in Red Hat Red Hat Enterprise Linux 10

0
Medium
VulnerabilityCVE-2026-1467cvecve-2026-1467
Published: Tue Jan 27 2026 (01/27/2026, 09:17:44 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

CVE-2026-1467 is a medium-severity CRLF injection vulnerability in the libsoup HTTP client library used by Red Hat Enterprise Linux 10. The flaw arises when an HTTP proxy is configured and libsoup improperly handles URL-decoded input for the Host header, allowing remote attackers to inject additional HTTP headers or request bodies via specially crafted URLs containing CRLF sequences. Exploitation can cause unauthorized HTTP requests to be forwarded by the proxy, potentially impacting downstream services. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. While no known exploits are currently in the wild, the vulnerability's scope includes all systems running affected versions of Red Hat Enterprise Linux 10 with libsoup-based HTTP proxy configurations. European organizations using this platform in proxy roles may face risks of request manipulation and potential service disruption. Mitigation involves applying vendor patches when available, validating and sanitizing URL inputs in proxy configurations, and monitoring HTTP traffic for anomalous header injections. Countries with significant Red Hat Enterprise Linux 10 deployments and critical infrastructure relying on HTTP proxies, such as Germany, France, and the UK, are most likely to be affected.

AI-Powered Analysis

AILast updated: 02/04/2026, 09:30:46 UTC

Technical Analysis

CVE-2026-1467 identifies a CRLF injection vulnerability in libsoup, an HTTP client library integral to Red Hat Enterprise Linux 10. The vulnerability manifests when an HTTP proxy is configured using libsoup, and the library fails to properly neutralize CRLF sequences in URL-decoded input used to construct the Host HTTP header. Attackers can exploit this by crafting URLs containing CRLF sequences that, when processed, inject additional HTTP headers or even complete HTTP request bodies into the proxied request. This injection can manipulate the behavior of downstream HTTP services by altering requests in unintended ways, potentially bypassing security controls or causing service disruptions. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS v3.1 score is 5.8 (medium), reflecting the lack of confidentiality impact but acknowledging the integrity impact due to unauthorized request manipulation. No known exploits have been reported in the wild yet, but the vulnerability's presence in a widely used enterprise Linux distribution and its HTTP proxy context make it a notable risk. The lack of patches at the time of reporting necessitates proactive mitigation steps. The vulnerability's scope is limited to configurations where libsoup is used as an HTTP proxy client, which is common in enterprise environments for traffic forwarding and filtering.

Potential Impact

For European organizations, the impact of CVE-2026-1467 centers on the potential for attackers to manipulate HTTP requests forwarded by proxies running on Red Hat Enterprise Linux 10 systems. This can lead to unauthorized request injection, which may bypass security policies, cause unintended actions on downstream services, or facilitate further attacks such as web cache poisoning or request smuggling. The integrity of HTTP communications is compromised, potentially affecting critical business applications relying on proxy infrastructure. While confidentiality and availability impacts are minimal, the integrity breach can disrupt service operations and trust in network traffic handling. Organizations in sectors such as finance, government, and telecommunications that rely heavily on proxy servers for traffic management and security are particularly at risk. The vulnerability could also be leveraged as part of a multi-stage attack chain, increasing its strategic importance. Given the medium severity and remote exploitability without authentication, timely mitigation is essential to reduce exposure.

Mitigation Recommendations

1. Monitor Red Hat and libsoup project advisories closely and apply official patches as soon as they become available to address CVE-2026-1467. 2. Until patches are released, implement input validation and sanitization on all URL inputs processed by HTTP proxies to detect and block CRLF sequences or suspicious characters. 3. Configure HTTP proxies to reject or log requests containing unexpected or malformed headers indicative of injection attempts. 4. Employ web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) with rules targeting CRLF injection patterns to detect and block exploitation attempts. 5. Conduct regular security audits of proxy configurations and traffic logs to identify anomalies or unauthorized header injections. 6. Limit exposure by restricting proxy access to trusted networks and enforcing strict access controls. 7. Educate network and security teams about the nature of CRLF injection vulnerabilities and the importance of monitoring HTTP header integrity. 8. Consider deploying layered defenses such as HTTP header sanitization modules or proxy software updates that harden header parsing logic. These steps go beyond generic advice by focusing on proactive detection, configuration hardening, and layered defense tailored to the specific vulnerability context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-01-27T08:07:32.077Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6978f0754623b1157c38c52f

Added to database: 1/27/2026, 5:05:57 PM

Last enriched: 2/4/2026, 9:30:46 AM

Last updated: 2/7/2026, 7:08:17 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats