CVE-2026-28367

Published Mar 27, 2026

Last updated 6 days ago

Overview

Description
A flaw was found in Undertow. A remote attacker can exploit this vulnerability by sending `\r\r\r` as a header block terminator. This can be used for request smuggling with certain proxy servers, such as older versions of Apache Traffic Server and Google Cloud Classic Application Load Balancer, potentially leading to unauthorized access or manipulation of web requests.
Source
secalert@redhat.com
NVD status
Analyzed
Products
build_of_apache_camel_-_hawtio, build_of_apache_camel_for_spring_boot, data_grid, fuse, jboss_enterprise_application_platform, jboss_enterprise_application_platform_expansion_pack, process_automation, single_sign-on, undertow

Risk scores

CVSS 3.1

Type
Primary
Base score
9.1
Impact score
5.2
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Severity
CRITICAL

Weaknesses

secalert@redhat.com
CWE-444

Social media

Hype score
Not currently trending

Configurations