CVE-2026-28368

Severity
9.1CRITICAL
EPSS
0.1%
top 70.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 27

Description

A flaw was found in Undertow. This vulnerability allows a remote attacker to construct specially crafted requests where header names are parsed differently by Undertow compared to upstream proxies. This discrepancy in header interpretation can be exploited to launch request smuggling attacks, potentially bypassing security controls and accessing unauthorized resources.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:NExploitability: 2.2 | Impact: 5.8

Affected Packages8 packages

Also affects: Enterprise Linux 9.0

🔴Vulnerability Details

4
GHSA
Undertow is Vulnerable to HTTP Request/Response Smuggling2026-03-27
OSV
CVE-2026-28368: A flaw was found in Undertow2026-03-27
CVEList
Undertow: undertow: request smuggling via inconsistent header parsing2026-03-27
OSV
Undertow is Vulnerable to HTTP Request/Response Smuggling2026-03-27

📋Vendor Advisories

2
Debian
CVE-2026-28368: undertow - A flaw was found in Undertow. This vulnerability allows a remote attacker to con...2026
Red Hat
undertow: Undertow: Request smuggling via inconsistent header parsing2025-08-27

🕵️Threat Intelligence

1
Wiz
CVE-2026-28368 Impact, Exploitability, and Mitigation Steps | Wiz