CVE-2026-1536CRLF Injection in Redhat Enterprise Linux

CWE-93CRLF Injection9 documents8 sources
Severity
5.3MEDIUMNVD
CNA5.8
EPSS
0.1%
top 69.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 28
Latest updateFeb 8

Description

A flaw was found in libsoup. An attacker who can control the input for the Content-Disposition header can inject CRLF (Carriage Return Line Feed) sequences into the header value. These sequences are then interpreted verbatim when the HTTP request or response is constructed, allowing arbitrary HTTP headers to be injected. This vulnerability can lead to HTTP header injection or HTTP response splitting without requiring authentication or user interaction.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages0 packages

Also affects: Enterprise Linux 10.0, 6.0, 7.0, 8.0, 9.0

🔴Vulnerability Details

4
OSV
libsoup3 vulnerabilities2026-02-08
GHSA
GHSA-x4cc-vgcc-h5h4: A flaw was found in libsoup2026-01-28
CVEList
Libsoup: libsoup: http header injection or response splitting via crlf injection in content-disposition header2026-01-28
OSV
CVE-2026-1536: A flaw was found in libsoup2026-01-28

📋Vendor Advisories

3
Ubuntu
libsoup vulnerabilities2026-02-08
Red Hat
libsoup: libsoup: HTTP header injection or response splitting via CRLF injection in Content-Disposition header2026-01-28
Debian
CVE-2026-1536: libsoup2.4 - A flaw was found in libsoup. An attacker who can control the input for the Conte...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-1536 Impact, Exploitability, and Mitigation Steps | Wiz