Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33490: CWE-706: Use of Incorrectly-Resolved Name or Reference in h3js h3

0
Low
VulnerabilityCVE-2026-33490cvecve-2026-33490cwe-706
Published: Thu Mar 26 2026 (03/26/2026, 17:19:15 UTC)
Source: CVE Database V5
Vendor/Project: h3js
Product: h3

Description

H3 is a minimal H(TTP) framework. In versions 2.0.0-0 through 2.0.1-rc.16, the `mount()` method in h3 uses a simple `startsWith()` check to determine whether incoming requests fall under a mounted sub-application's path prefix. Because this check does not verify a path segment boundary (i.e., that the next character after the base is `/` or end-of-string), middleware registered on a mount like `/admin` will also execute for unrelated routes such as `/admin-public`, `/administrator`, or `/adminstuff`. This allows an attacker to trigger context-setting middleware on paths it was never intended to cover, potentially polluting request context with unintended privilege flags. Version 2.0.2-rc.17 contains a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 18:01:58 UTC

Technical Analysis

The vulnerability CVE-2026-33490 affects the h3js minimal HTTP framework, specifically versions from 2.0.0-0 up to 2.0.1-rc.16. The root cause is in the mount() method, which mounts sub-applications by checking if incoming request paths start with a given prefix using the startsWith() function. However, this check does not ensure that the prefix matches a complete path segment boundary; it only verifies that the path begins with the prefix string. Consequently, middleware registered on a path like /admin will also be invoked for requests to paths such as /admin-public, /administrator, or /adminstuff. This behavior can lead to middleware executing in contexts it was not intended for, potentially setting privilege flags or other context data incorrectly. This can cause privilege pollution where unauthorized routes gain elevated privileges or access controls intended for the mounted path. The vulnerability does not allow direct data disclosure or denial of service but can undermine application logic integrity. The flaw is fixed in h3js version 2.0.2-rc.17 by implementing proper path segment boundary checks. No known exploits are reported in the wild as of the publication date. The CVSS 3.1 base score is 3.7, reflecting low severity due to the limited impact and exploitation complexity.

Potential Impact

The primary impact of this vulnerability is the potential for privilege pollution within applications using the affected h3js versions. Middleware intended to protect or modify requests under specific path prefixes may inadvertently execute on unrelated paths, potentially granting unauthorized privileges or altering request context inappropriately. This can lead to logical flaws, unauthorized access to privileged functionality, or bypass of intended access controls. While it does not directly expose sensitive data or cause service disruption, the integrity of application security controls is compromised. Organizations relying on h3js for routing and middleware management in web applications could face increased risk of privilege escalation attacks or unauthorized feature access. The impact is more significant in applications with sensitive administrative or restricted routes mounted via h3's mount() method. Since exploitation requires no authentication or user interaction, attackers can probe and exploit this flaw remotely. However, the overall risk is mitigated by the need for specific middleware configurations and the limited scope of the vulnerability.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade all instances of h3js to version 2.0.2-rc.17 or later, where the patch correctly verifies path segment boundaries in the mount() method. Until upgrading is possible, developers should review and refactor middleware mounting logic to ensure explicit path segment checks are implemented, such as verifying that the character following the prefix is either a slash ('/') or the end of the string. Application code can implement custom middleware wrappers to enforce stricter path matching rules. Additionally, thorough testing of route matching and middleware execution paths should be conducted to detect unintended middleware invocation. Monitoring and logging of unusual access patterns to administrative or privileged routes can help detect exploitation attempts. Finally, applying the principle of least privilege in middleware design and minimizing privilege flags set in request contexts reduces the potential impact of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-20T16:16:48.971Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c570d8f4197a8e3bef1eff

Added to database: 3/26/2026, 5:46:00 PM

Last enriched: 3/26/2026, 6:01:58 PM

Last updated: 3/26/2026, 8:27:15 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses