Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-3633

CVE-2026-3633: Gnome Libsoup RCE Vulnerability

CVE-2026-3633 is a remote code execution vulnerability in Gnome Libsoup caused by CRLF injection. Attackers can inject arbitrary headers via the soup_message_new() function. This article covers technical details, impact, and mitigation.

Published: March 20, 2026

CVE-2026-3633 Overview

A CRLF (Carriage Return Line Feed) injection vulnerability has been discovered in GNOME libsoup, a popular HTTP client/server library used extensively in Linux desktop environments. The flaw exists in the soup_message_new() function, where a remote attacker controlling the method parameter can inject arbitrary headers and additional request data into HTTP requests. This occurs because the method value is not properly escaped during request line construction, potentially enabling HTTP request injection attacks.

Critical Impact

Remote attackers can manipulate HTTP requests by injecting arbitrary headers, potentially leading to cache poisoning, session hijacking, or request smuggling attacks against downstream systems.

Affected Products

  • GNOME libsoup (all versions prior to patch)
  • Red Hat Enterprise Linux 6.0
  • Red Hat Enterprise Linux 7.0
  • Red Hat Enterprise Linux 8.0
  • Red Hat Enterprise Linux 9.0
  • Red Hat Enterprise Linux 10.0

Discovery Timeline

  • 2026-03-17 - CVE-2026-3633 published to NVD
  • 2026-03-19 - Last updated in NVD database

Technical Details for CVE-2026-3633

Vulnerability Analysis

This vulnerability is classified as CWE-93 (Improper Neutralization of CRLF Sequences). The core issue lies in the improper handling of user-controlled input within the soup_message_new() function. When constructing HTTP request lines, libsoup fails to sanitize or validate the method parameter for CRLF characters (\r\n). An attacker who can influence the method parameter can embed these control characters to break out of the intended request line and inject additional HTTP headers or even complete secondary requests.

The network-based attack vector allows exploitation without authentication, though the impact is limited to confidentiality and integrity compromise without affecting system availability. Applications that pass user-controlled data to soup_message_new() without validation are particularly at risk.

Root Cause

The root cause is inadequate input validation in the HTTP request construction logic within libsoup. The soup_message_new() function accepts a method string parameter that is directly incorporated into the HTTP request line without escaping or filtering CRLF sequences. This violates secure coding principles that mandate strict validation of all input that becomes part of protocol-level constructs.

Attack Vector

The attack vector is network-based and requires no privileges or user interaction. An attacker must be able to influence the method parameter passed to the vulnerable function. This could occur in scenarios where:

  1. An application accepts user input that eventually reaches the method parameter
  2. Data from untrusted sources (e.g., configuration files, environment variables, external APIs) is used to construct HTTP requests
  3. Proxy or gateway applications that forward or transform HTTP methods

By injecting a string like GET / HTTP/1.1\r\nX-Injected: malicious\r\n\r\nGET /admin as the method, an attacker can craft requests that appear legitimate but contain injected headers or smuggled requests.

The vulnerability mechanism involves improper neutralization of CRLF sequences in the method parameter of soup_message_new(). When an attacker provides a method string containing carriage return (\r) and line feed (\n) characters, these are not sanitized before being written to the HTTP request. This allows the attacker to terminate the request line prematurely and inject arbitrary header fields or additional request data. For detailed technical analysis, see the GNOME Issue #484 for libsoup.

Detection Methods for CVE-2026-3633

Indicators of Compromise

  • Unusual HTTP method values in web server or proxy logs containing encoded or literal CRLF sequences
  • HTTP requests with unexpected or duplicate headers that may indicate injection
  • Log entries showing malformed HTTP requests originating from libsoup-based applications
  • Network traffic containing HTTP requests with abnormally long or malformed request lines

Detection Strategies

  • Deploy network intrusion detection rules to identify HTTP requests containing CRLF sequences in method fields
  • Implement application-level logging to capture the raw method parameter values passed to soup_message_new()
  • Monitor web application firewall (WAF) logs for HTTP request smuggling or header injection attempts
  • Use SentinelOne's behavioral AI to detect anomalous HTTP client behavior from applications using libsoup

Monitoring Recommendations

  • Enable verbose logging on applications using libsoup to capture HTTP request construction details
  • Configure SIEM rules to alert on HTTP method fields containing control characters or encoded newlines
  • Monitor for increased error rates in downstream web servers that may indicate malformed request injection
  • Implement network-level monitoring for HTTP protocol anomalies using deep packet inspection

How to Mitigate CVE-2026-3633

Immediate Actions Required

  • Identify all applications and systems using libsoup and assess exposure to this vulnerability
  • Apply vendor-provided patches for libsoup as soon as they become available
  • Implement input validation in application code to reject method parameters containing CRLF characters
  • Review application logic to ensure user-controlled data does not reach HTTP method parameters

Patch Information

Consult the vendor advisories for official patch information:

  • Red Hat CVE-2026-3633 Advisory - Official Red Hat security advisory with patch details
  • Red Hat Bug Report #2445128 - Bugzilla tracking entry
  • GNOME Issue #484 for libsoup - Upstream issue tracker

Red Hat Enterprise Linux users should apply updates through their standard package management channels once patches are released.

Workarounds

  • Implement strict input validation to sanitize or reject any method strings containing \r or \n characters before passing to libsoup functions
  • Use application-layer filtering to whitelist only valid HTTP methods (GET, POST, PUT, DELETE, etc.)
  • Deploy a web application firewall in front of affected services to detect and block HTTP header injection attempts
  • Consider using alternative HTTP libraries that properly sanitize method inputs if patching is not immediately possible
bash
# Example input validation for method parameter in shell scripts
# Reject any method containing CRLF characters
validate_http_method() {
    local method="$1"
    if [[ "$method" =~ [$'\r\n'] ]]; then
        echo "Error: Invalid HTTP method - contains control characters"
        return 1
    fi
    # Optionally whitelist valid methods
    case "$method" in
        GET|POST|PUT|DELETE|HEAD|OPTIONS|PATCH)
            return 0
            ;;
        *)
            echo "Warning: Non-standard HTTP method: $method"
            return 0
            ;;
    esac
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechLibsoup

  • SeverityMEDIUM

  • CVSS Score6.5

  • EPSS Probability0.11%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-93
  • Vendor Resources
  • Red Hat CVE-2026-3633 Advisory

  • Red Hat Bug Report #2445128

  • GNOME Issue #484 for libsoup
  • Related CVEs
  • CVE-2026-5119: Gnome Libsoup Information Disclosure Flaw

  • CVE-2026-2436: libsoup SoupServer DoS Vulnerability

  • CVE-2026-3632: Gnome Libsoup SSRF Vulnerability

  • CVE-2026-4271: Gnome Libsoup Use-After-Free Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English