CVE-2026-33128: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in h3js h3
CVE-2026-33128 is a high-severity vulnerability in the h3js minimal HTTP framework affecting versions prior to 1. 15. 6 and between 2. 0. 0 and 2. 0. 1-rc. 14. The flaw arises from improper neutralization of CRLF sequences in Server-Sent Events (SSE) message fields, allowing attackers who control any SSE message component (id, event, data, comment) to inject arbitrary SSE events to connected clients. This can lead to integrity compromise of SSE streams without requiring authentication or user interaction.
AI Analysis
Technical Summary
CVE-2026-33128 is a vulnerability classified under CWE-93 (Improper Neutralization of CRLF Sequences) affecting the h3js minimal HTTP framework, specifically in the createEventStream function used for Server-Sent Events (SSE). The issue exists in versions prior to 1.15.6 and between 2.0.0 and 2.0.1-rc.14, where the functions formatEventStreamMessage() and formatEventStreamComment() fail to sanitize newline characters properly. SSE is a web technology that allows servers to push real-time updates to clients over HTTP. The vulnerability allows an attacker who can control any part of an SSE message field—such as id, event, data, or comment—to inject arbitrary SSE events. This injection can manipulate the event stream received by clients, potentially causing them to execute unintended actions or process malicious data. The flaw arises because the framework does not neutralize CRLF sequences, which are used to delimit SSE messages, enabling injection of crafted events. The vulnerability has a CVSS 3.1 score of 7.5, indicating high severity, with network attack vector, high attack complexity, no privileges required, no user interaction, and a scope change due to impact on connected clients. The integrity of the SSE stream is compromised, but confidentiality and availability impacts are limited. The issue is fixed in h3js versions 1.15.6 and 2.0.1-rc.15. No known exploits have been reported in the wild as of the publication date.
Potential Impact
The primary impact of this vulnerability is the compromise of the integrity of Server-Sent Events streams delivered by vulnerable h3js servers. Attackers able to inject arbitrary SSE events can manipulate client-side event handling, potentially causing clients to execute malicious scripts or process falsified data. This could lead to unauthorized actions within client applications relying on SSE for real-time updates, such as injecting misleading information, triggering unintended behaviors, or bypassing client-side logic. While confidentiality and availability impacts are minimal, the integrity breach can undermine trust in real-time data streams and disrupt application workflows. Organizations using h3js in environments where SSE is critical—such as live dashboards, notifications, or real-time monitoring—face risks of data manipulation and client-side exploitation. The attack requires network access to the vulnerable server but no authentication or user interaction, increasing the risk in exposed deployments. Although no exploits are currently known in the wild, the high severity and ease of exploitation warrant prompt remediation to prevent potential attacks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all affected h3js instances to version 1.15.6 or later, or 2.0.1-rc.15 or later, where the issue is fixed. If immediate upgrading is not feasible, implement input validation and sanitization on all SSE message fields (id, event, data, comment) to neutralize CRLF sequences before they reach the createEventStream functions. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SSE payloads containing CRLF injection patterns. Restrict network access to SSE endpoints to trusted clients and internal networks to reduce exposure. Monitor SSE traffic for anomalies that could indicate injection attempts. Additionally, review client-side SSE event handlers for robustness against malformed or unexpected events to minimize impact if injection occurs. Maintain up-to-date inventory of h3js versions in use and apply security patches promptly. Finally, conduct security testing focused on SSE injection vectors during development and deployment cycles.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Canada, Australia, Netherlands, Sweden
CVE-2026-33128: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in h3js h3
Description
CVE-2026-33128 is a high-severity vulnerability in the h3js minimal HTTP framework affecting versions prior to 1. 15. 6 and between 2. 0. 0 and 2. 0. 1-rc. 14. The flaw arises from improper neutralization of CRLF sequences in Server-Sent Events (SSE) message fields, allowing attackers who control any SSE message component (id, event, data, comment) to inject arbitrary SSE events to connected clients. This can lead to integrity compromise of SSE streams without requiring authentication or user interaction.
AI-Powered Analysis
Technical Analysis
CVE-2026-33128 is a vulnerability classified under CWE-93 (Improper Neutralization of CRLF Sequences) affecting the h3js minimal HTTP framework, specifically in the createEventStream function used for Server-Sent Events (SSE). The issue exists in versions prior to 1.15.6 and between 2.0.0 and 2.0.1-rc.14, where the functions formatEventStreamMessage() and formatEventStreamComment() fail to sanitize newline characters properly. SSE is a web technology that allows servers to push real-time updates to clients over HTTP. The vulnerability allows an attacker who can control any part of an SSE message field—such as id, event, data, or comment—to inject arbitrary SSE events. This injection can manipulate the event stream received by clients, potentially causing them to execute unintended actions or process malicious data. The flaw arises because the framework does not neutralize CRLF sequences, which are used to delimit SSE messages, enabling injection of crafted events. The vulnerability has a CVSS 3.1 score of 7.5, indicating high severity, with network attack vector, high attack complexity, no privileges required, no user interaction, and a scope change due to impact on connected clients. The integrity of the SSE stream is compromised, but confidentiality and availability impacts are limited. The issue is fixed in h3js versions 1.15.6 and 2.0.1-rc.15. No known exploits have been reported in the wild as of the publication date.
Potential Impact
The primary impact of this vulnerability is the compromise of the integrity of Server-Sent Events streams delivered by vulnerable h3js servers. Attackers able to inject arbitrary SSE events can manipulate client-side event handling, potentially causing clients to execute malicious scripts or process falsified data. This could lead to unauthorized actions within client applications relying on SSE for real-time updates, such as injecting misleading information, triggering unintended behaviors, or bypassing client-side logic. While confidentiality and availability impacts are minimal, the integrity breach can undermine trust in real-time data streams and disrupt application workflows. Organizations using h3js in environments where SSE is critical—such as live dashboards, notifications, or real-time monitoring—face risks of data manipulation and client-side exploitation. The attack requires network access to the vulnerable server but no authentication or user interaction, increasing the risk in exposed deployments. Although no exploits are currently known in the wild, the high severity and ease of exploitation warrant prompt remediation to prevent potential attacks.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade all affected h3js instances to version 1.15.6 or later, or 2.0.1-rc.15 or later, where the issue is fixed. If immediate upgrading is not feasible, implement input validation and sanitization on all SSE message fields (id, event, data, comment) to neutralize CRLF sequences before they reach the createEventStream functions. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious SSE payloads containing CRLF injection patterns. Restrict network access to SSE endpoints to trusted clients and internal networks to reduce exposure. Monitor SSE traffic for anomalies that could indicate injection attempts. Additionally, review client-side SSE event handlers for robustness against malformed or unexpected events to minimize impact if injection occurs. Maintain up-to-date inventory of h3js versions in use and apply security patches promptly. Finally, conduct security testing focused on SSE injection vectors during development and deployment cycles.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T20:35:49.927Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bd194ce32a4fbe5f4ea6c0
Added to database: 3/20/2026, 9:54:20 AM
Last enriched: 3/20/2026, 10:08:41 AM
Last updated: 3/20/2026, 11:23:09 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.