Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3634: Improper Neutralization of CRLF Sequences ('CRLF Injection') in Red Hat Red Hat Enterprise Linux 10

0
Low
VulnerabilityCVE-2026-3634cvecve-2026-3634
Published: Tue Mar 17 2026 (03/17/2026, 09:44:19 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

CVE-2026-3634 is a CRLF injection vulnerability in the libsoup library used by Red Hat Enterprise Linux 10. The flaw arises from improper sanitization of input in the soup_message_headers_set_content_type() function, allowing an attacker controlling the Content-Type header value to inject carriage return and line feed sequences. This can lead to HTTP header injection and response splitting attacks, potentially enabling malicious manipulation of HTTP responses. The vulnerability requires high privileges and user interaction to exploit, with a CVSS score of 3. 9 indicating low severity. No known exploits are currently reported in the wild. Organizations using Red Hat Enterprise Linux 10 with libsoup should apply patches once available and implement strict input validation to mitigate risks.

AI-Powered Analysis

AILast updated: 03/17/2026, 18:29:25 UTC

Technical Analysis

CVE-2026-3634 identifies a security vulnerability in the libsoup library component of Red Hat Enterprise Linux 10. The issue stems from the soup_message_headers_set_content_type() function, which fails to properly neutralize Carriage Return Line Feed (CRLF) sequences in the Content-Type header value. An attacker who can control this header value can inject arbitrary CRLF sequences, effectively enabling HTTP header injection and response splitting attacks. These attacks can manipulate HTTP responses, potentially leading to session fixation, cross-site scripting (XSS), cache poisoning, or other web-based attacks depending on the context in which libsoup is used. Exploitation requires the attacker to have high privileges and user interaction, limiting the ease of exploitation. The vulnerability has a CVSS 3.1 base score of 3.9, reflecting low severity due to the complexity and limited impact scope. No public exploits or active exploitation have been reported to date. The vulnerability highlights the importance of proper input sanitization in HTTP header processing to prevent injection attacks.

Potential Impact

The primary impact of CVE-2026-3634 is the potential for HTTP header injection and response splitting attacks, which can undermine the integrity and confidentiality of web communications handled by applications using libsoup on Red Hat Enterprise Linux 10. Although the vulnerability requires high privileges and user interaction, successful exploitation could allow attackers to manipulate HTTP responses, potentially leading to session hijacking, XSS, or cache poisoning. This could affect web services, APIs, or other networked applications relying on libsoup for HTTP communication. The overall impact is limited by the requirement for elevated privileges and user interaction, as well as the low CVSS score. However, organizations with critical web-facing services or internal applications using libsoup should consider the risk carefully, as exploitation could facilitate further attacks or data leakage.

Mitigation Recommendations

To mitigate CVE-2026-3634, organizations should prioritize applying official patches or updates from Red Hat as soon as they become available. In the interim, restrict access to systems running Red Hat Enterprise Linux 10 to trusted users to reduce the risk of privilege escalation and exploitation. Implement strict input validation and sanitization on any user-controllable inputs that influence HTTP headers, especially the Content-Type header, to prevent injection of CRLF sequences. Employ web application firewalls (WAFs) or intrusion detection systems (IDS) configured to detect and block HTTP header injection patterns. Conduct thorough code reviews and security testing on applications using libsoup to identify and remediate unsafe header handling. Additionally, monitor logs for unusual HTTP response behaviors that may indicate attempted exploitation. Finally, educate developers and system administrators about the risks of CRLF injection and secure coding practices related to HTTP header management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2026-03-06T08:03:35.024Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b99a3b771bdb1749cb0cab

Added to database: 3/17/2026, 6:15:23 PM

Last enriched: 3/17/2026, 6:29:25 PM

Last updated: 3/18/2026, 5:22:27 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses