CVE-2026-2708 PUBLISHED

Libsoup: libsoup: http request smuggling via duplicate content-length headers

Assigner: redhat
Reserved: 18.02.2026 Published: 23.04.2026 Updated: 23.04.2026

A request smuggling vulnerability exists in libsoup's HTTP/1 header parsing logic. The soup_message_headers_append_common() function in libsoup/soup-message-headers.c unconditionally appends each header value without validating for duplicate or conflicting Content-Length fields. This allows an attacker to send HTTP requests containing multiple Content-Length headers with differing values.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS Score: 3.7

Product Status

Vendor Red Hat
Product Red Hat Enterprise Linux 10
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux 6
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux 7
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux 8
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux 9
Versions Default: affected

Credits

  • Red Hat would like to thank Cavid for reporting this issue.

References

Problem Types

  • Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') CWE