Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1467: Improper Neutralization of CRLF Sequences ('CRLF Injection') in Red Hat Red Hat Enterprise Linux 10

0
Medium
VulnerabilityCVE-2026-1467cvecve-2026-1467
Published: Tue Jan 27 2026 (01/27/2026, 09:17:44 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in libsoup, an HTTP client library. This vulnerability, known as CRLF (Carriage Return Line Feed) Injection, occurs when an HTTP proxy is configured and the library improperly handles URL-decoded input used to create the Host header. A remote attacker can exploit this by providing a specially crafted URL containing CRLF sequences, allowing them to inject additional HTTP headers or complete HTTP request bodies. This can lead to unintended or unauthorized HTTP requests being forwarded by the proxy, potentially impacting downstream services.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 01:56:50 UTC

Technical Analysis

CVE-2026-1467 identifies a vulnerability in libsoup, an HTTP client library integral to Red Hat Enterprise Linux 10. The issue is a CRLF injection flaw that occurs when libsoup is used in an HTTP proxy configuration. Specifically, the library improperly processes URL-decoded input used to construct the Host HTTP header. An attacker can exploit this by sending a specially crafted URL containing CRLF (Carriage Return Line Feed) sequences, which are interpreted as header or request delimiters in HTTP. This allows the attacker to inject additional HTTP headers or even entire HTTP request bodies into the proxied request. Such injection can lead to the proxy forwarding unintended or unauthorized HTTP requests to downstream services, potentially bypassing security controls or causing unexpected behavior. The vulnerability does not impact confidentiality directly but can affect the integrity of HTTP requests and the behavior of downstream services. The CVSS 3.1 base score is 5.8 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction, and has a scope change (S:C) due to affecting downstream services. No known exploits are reported yet, but the flaw's nature makes it a candidate for exploitation in proxy environments. The vulnerability highlights the importance of proper input sanitization and header construction in HTTP client libraries, especially when proxies are involved.

Potential Impact

The primary impact of CVE-2026-1467 is on the integrity of HTTP requests forwarded by proxies using libsoup. Attackers can manipulate HTTP headers or inject request bodies, potentially causing downstream services to process malicious or unintended requests. This can lead to security bypasses, unauthorized actions, or disruption of service logic. Although confidentiality and availability are not directly compromised, the integrity loss can facilitate further attacks such as request smuggling, cache poisoning, or unauthorized access if downstream services rely on header values for access control or routing. Organizations using Red Hat Enterprise Linux 10 with libsoup in proxy configurations are at risk, especially in environments where proxies mediate sensitive or critical HTTP traffic. The vulnerability could be leveraged in targeted attacks against enterprise networks, cloud environments, or service providers relying on these proxies. The lack of required authentication and user interaction increases the risk of remote exploitation.

Mitigation Recommendations

To mitigate CVE-2026-1467, organizations should: 1) Apply official patches or updates from Red Hat as soon as they become available to fix the libsoup library. 2) Review and harden HTTP proxy configurations to limit exposure, including restricting allowed URL inputs and validating headers before forwarding. 3) Implement input validation and sanitization on all user-supplied URLs or parameters that may be processed by libsoup or related proxy components. 4) Monitor proxy logs for unusual or malformed HTTP requests containing CRLF sequences or unexpected header injections. 5) Employ web application firewalls (WAFs) or intrusion detection systems (IDS) capable of detecting CRLF injection patterns. 6) Where feasible, isolate proxy services and limit their network exposure to trusted sources only. 7) Educate development and operations teams about the risks of CRLF injection and secure coding practices related to HTTP header construction. These steps go beyond generic advice by focusing on proxy-specific configurations and proactive monitoring tailored to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-01-27T08:07:32.077Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6978f0754623b1157c38c52f

Added to database: 1/27/2026, 5:05:57 PM

Last enriched: 3/20/2026, 1:56:50 AM

Last updated: 3/25/2026, 2:31:22 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses