CVE-2026-33131: CWE-290: Authentication Bypass by Spoofing in h3js h3
H3 is a minimal H(TTP) framework. Versions 2.0.0-0 through 2.0.1-rc.14 contain a Host header spoofing vulnerability in the NodeRequestUrl (which extends FastURL) which allows middleware bypass. When event.url, event.url.hostname, or event.url._url is accessed, such as in a logging middleware, the _url getter constructs a URL from untrusted data, including the user-controlled Host header. Because H3's router resolves the route handler before middleware runs, an attacker can supply a crafted Host header (e.g., Host: localhost:3000/abchehe?) to make the middleware path check fail while the route handler still matches, effectively bypassing authentication or authorization middleware. This affects any application built on H3 (including Nitro/Nuxt) that accesses event.url properties in middleware guarding sensitive routes. The issue requires an immediate fix to prevent FastURL.href from being constructed with unsanitized, attacker-controlled input. Version 2.0.1-rc.15 contains a patch for this issue.
AI Analysis
Technical Summary
CVE-2026-33131 is an authentication bypass vulnerability classified under CWE-290 affecting the h3js h3 minimal HTTP framework, specifically versions from 2.0.0-0 up to but not including 2.0.1-rc.15. The vulnerability stems from the NodeRequestUrl component, which extends FastURL and constructs URLs from HTTP request data, including the Host header. Because the Host header is user-controlled and not properly sanitized, an attacker can craft a malicious Host header (e.g., Host: localhost:3000/abchehe?) that manipulates the URL construction in the _url getter. This manipulation causes middleware that performs path-based authentication or authorization checks to fail, as the middleware relies on event.url properties that are influenced by the spoofed Host header. However, the router resolves the route handler before middleware runs, so the route handler still matches the intended route, effectively bypassing security controls implemented in middleware. This flaw allows attackers to circumvent authentication or authorization mechanisms without credentials or user interaction. The vulnerability affects any application built on h3 that accesses event.url, event.url.hostname, or event.url._url in middleware protecting sensitive routes. The root cause is the construction of FastURL.href from unsanitized, attacker-controlled input. The issue was addressed in h3 version 2.0.1-rc.15 by sanitizing the Host header input before URL construction. No known exploits are currently reported in the wild, but the high CVSS score of 7.4 reflects the significant risk posed by this vulnerability.
Potential Impact
The primary impact of CVE-2026-33131 is unauthorized access to protected resources due to authentication or authorization bypass. Attackers can exploit this vulnerability to access sensitive endpoints or perform actions reserved for authenticated users, potentially leading to data breaches, privilege escalation, or unauthorized operations. Since h3 is used in frameworks like Nitro and Nuxt, which are popular in modern web application development, a large number of web applications could be affected globally. The bypass requires no authentication or user interaction, increasing the risk of automated exploitation. The vulnerability compromises confidentiality and integrity but does not affect availability. Organizations relying on middleware for security enforcement in h3-based applications are at risk of having their security controls circumvented, which could lead to exposure of sensitive data, unauthorized modifications, or further exploitation within the application environment.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade all affected h3 framework instances to version 2.0.1-rc.15 or later, where the Host header spoofing issue is patched. Developers should audit middleware code that accesses event.url, event.url.hostname, or event.url._url to ensure that URL components are not constructed from unsanitized user input. Implement strict validation and sanitization of the Host header before using it in URL construction or routing logic. Consider adding explicit checks in middleware to verify that the Host header matches expected values or use server-side configuration to enforce allowed hosts. Additionally, review the order of middleware and route handler execution to prevent route resolution before security checks. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) to detect and block suspicious Host header manipulations. Finally, monitor application logs for unusual Host header values or access patterns that may indicate exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Japan, South Korea, Netherlands, India, Brazil
CVE-2026-33131: CWE-290: Authentication Bypass by Spoofing in h3js h3
Description
H3 is a minimal H(TTP) framework. Versions 2.0.0-0 through 2.0.1-rc.14 contain a Host header spoofing vulnerability in the NodeRequestUrl (which extends FastURL) which allows middleware bypass. When event.url, event.url.hostname, or event.url._url is accessed, such as in a logging middleware, the _url getter constructs a URL from untrusted data, including the user-controlled Host header. Because H3's router resolves the route handler before middleware runs, an attacker can supply a crafted Host header (e.g., Host: localhost:3000/abchehe?) to make the middleware path check fail while the route handler still matches, effectively bypassing authentication or authorization middleware. This affects any application built on H3 (including Nitro/Nuxt) that accesses event.url properties in middleware guarding sensitive routes. The issue requires an immediate fix to prevent FastURL.href from being constructed with unsanitized, attacker-controlled input. Version 2.0.1-rc.15 contains a patch for this issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33131 is an authentication bypass vulnerability classified under CWE-290 affecting the h3js h3 minimal HTTP framework, specifically versions from 2.0.0-0 up to but not including 2.0.1-rc.15. The vulnerability stems from the NodeRequestUrl component, which extends FastURL and constructs URLs from HTTP request data, including the Host header. Because the Host header is user-controlled and not properly sanitized, an attacker can craft a malicious Host header (e.g., Host: localhost:3000/abchehe?) that manipulates the URL construction in the _url getter. This manipulation causes middleware that performs path-based authentication or authorization checks to fail, as the middleware relies on event.url properties that are influenced by the spoofed Host header. However, the router resolves the route handler before middleware runs, so the route handler still matches the intended route, effectively bypassing security controls implemented in middleware. This flaw allows attackers to circumvent authentication or authorization mechanisms without credentials or user interaction. The vulnerability affects any application built on h3 that accesses event.url, event.url.hostname, or event.url._url in middleware protecting sensitive routes. The root cause is the construction of FastURL.href from unsanitized, attacker-controlled input. The issue was addressed in h3 version 2.0.1-rc.15 by sanitizing the Host header input before URL construction. No known exploits are currently reported in the wild, but the high CVSS score of 7.4 reflects the significant risk posed by this vulnerability.
Potential Impact
The primary impact of CVE-2026-33131 is unauthorized access to protected resources due to authentication or authorization bypass. Attackers can exploit this vulnerability to access sensitive endpoints or perform actions reserved for authenticated users, potentially leading to data breaches, privilege escalation, or unauthorized operations. Since h3 is used in frameworks like Nitro and Nuxt, which are popular in modern web application development, a large number of web applications could be affected globally. The bypass requires no authentication or user interaction, increasing the risk of automated exploitation. The vulnerability compromises confidentiality and integrity but does not affect availability. Organizations relying on middleware for security enforcement in h3-based applications are at risk of having their security controls circumvented, which could lead to exposure of sensitive data, unauthorized modifications, or further exploitation within the application environment.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade all affected h3 framework instances to version 2.0.1-rc.15 or later, where the Host header spoofing issue is patched. Developers should audit middleware code that accesses event.url, event.url.hostname, or event.url._url to ensure that URL components are not constructed from unsanitized user input. Implement strict validation and sanitization of the Host header before using it in URL construction or routing logic. Consider adding explicit checks in middleware to verify that the Host header matches expected values or use server-side configuration to enforce allowed hosts. Additionally, review the order of middleware and route handler execution to prevent route resolution before security checks. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) to detect and block suspicious Host header manipulations. Finally, monitor application logs for unusual Host header values or access patterns that may indicate exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T20:35:49.927Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bd23e7e32a4fbe5f52014e
Added to database: 3/20/2026, 10:39:35 AM
Last enriched: 3/20/2026, 10:53:42 AM
Last updated: 5/2/2026, 12:54:03 PM
Views: 128
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.