CVE-2026-1527
Severity
4.6MEDIUM
EPSS
0.0%
top 98.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 12
Latest updateMar 13
Description
ImpactWhen an application passes user-controlled input to the upgrade option of client.request(), an attacker can inject CRLF sequences (\r\n) to:
* Inject arbitrary HTTP headers
* Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch)
The vulnerability exists because undici writes the upgrade value directly to the socket without validating for invalid header characters:
// lib/dispatcher/client-h1.js:1121
if (upgrade) {
header += `co…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:NExploitability: 2.1 | Impact: 2.5
Affected Packages4 packages
Patches
🔴Vulnerability Details
4OSV▶
CVE-2026-1527: ImpactWhen an application passes user-controlled input to the upgrade option of client↗2026-03-12
📋Vendor Advisories
2🕵️Threat Intelligence
1💬Community
1Bugzilla
▶