Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33131: CWE-290: Authentication Bypass by Spoofing in h3js h3

0
High
VulnerabilityCVE-2026-33131cvecve-2026-33131cwe-290
Published: Fri Mar 20 2026 (03/20/2026, 10:16:29 UTC)
Source: CVE Database V5
Vendor/Project: h3js
Product: h3

Description

CVE-2026-33131 is a high-severity authentication bypass vulnerability in the h3js h3 framework versions 2. 0. 0-0 through 2. 0. 1-rc. 14. The flaw arises from improper handling of the Host header in the NodeRequestUrl component, allowing attackers to spoof the Host header and bypass middleware authentication or authorization checks. This occurs because the router resolves route handlers before middleware execution, and the URL construction uses unsanitized user input from the Host header. Applications built on h3, including Nitro/Nuxt, that rely on event. url properties in middleware for security are vulnerable.

AI-Powered Analysis

AILast updated: 03/20/2026, 10:53:42 UTC

Technical Analysis

CVE-2026-33131 is an authentication bypass vulnerability classified under CWE-290 affecting the h3js h3 minimal HTTP framework, specifically versions from 2.0.0-0 up to but not including 2.0.1-rc.15. The vulnerability stems from the NodeRequestUrl component, which extends FastURL and constructs URLs from HTTP request data, including the Host header. Because the Host header is user-controlled and not properly sanitized, an attacker can craft a malicious Host header (e.g., Host: localhost:3000/abchehe?) that manipulates the URL construction in the _url getter. This manipulation causes middleware that performs path-based authentication or authorization checks to fail, as the middleware relies on event.url properties that are influenced by the spoofed Host header. However, the router resolves the route handler before middleware runs, so the route handler still matches the intended route, effectively bypassing security controls implemented in middleware. This flaw allows attackers to circumvent authentication or authorization mechanisms without credentials or user interaction. The vulnerability affects any application built on h3 that accesses event.url, event.url.hostname, or event.url._url in middleware protecting sensitive routes. The root cause is the construction of FastURL.href from unsanitized, attacker-controlled input. The issue was addressed in h3 version 2.0.1-rc.15 by sanitizing the Host header input before URL construction. No known exploits are currently reported in the wild, but the high CVSS score of 7.4 reflects the significant risk posed by this vulnerability.

Potential Impact

The primary impact of CVE-2026-33131 is unauthorized access to protected resources due to authentication or authorization bypass. Attackers can exploit this vulnerability to access sensitive endpoints or perform actions reserved for authenticated users, potentially leading to data breaches, privilege escalation, or unauthorized operations. Since h3 is used in frameworks like Nitro and Nuxt, which are popular in modern web application development, a large number of web applications could be affected globally. The bypass requires no authentication or user interaction, increasing the risk of automated exploitation. The vulnerability compromises confidentiality and integrity but does not affect availability. Organizations relying on middleware for security enforcement in h3-based applications are at risk of having their security controls circumvented, which could lead to exposure of sensitive data, unauthorized modifications, or further exploitation within the application environment.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade all affected h3 framework instances to version 2.0.1-rc.15 or later, where the Host header spoofing issue is patched. Developers should audit middleware code that accesses event.url, event.url.hostname, or event.url._url to ensure that URL components are not constructed from unsanitized user input. Implement strict validation and sanitization of the Host header before using it in URL construction or routing logic. Consider adding explicit checks in middleware to verify that the Host header matches expected values or use server-side configuration to enforce allowed hosts. Additionally, review the order of middleware and route handler execution to prevent route resolution before security checks. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) to detect and block suspicious Host header manipulations. Finally, monitor application logs for unusual Host header values or access patterns that may indicate exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T20:35:49.927Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bd23e7e32a4fbe5f52014e

Added to database: 3/20/2026, 10:39:35 AM

Last enriched: 3/20/2026, 10:53:42 AM

Last updated: 3/20/2026, 11:40:38 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses