CVE-2026-28367

high Apache
CVSS v3 Base Score
8.7
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
EPSS Score
0.0%
Exploitation probability in 30 days
Top 86% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Confidentiality
High
Integrity
High
Availability
None
Published: March 27, 2026 (48 days ago)
Last Modified: April 8, 2026
Vendor: Apache
Source: MITRE

Description

A flaw was found in Undertow. A remote attacker can exploit this vulnerability by sending `\r\r\r` as a header block terminator. This can be used for request smuggling with certain proxy servers, such as older versions of Apache Traffic Server and Google Cloud Classic Application Load Balancer, potentially leading to unauthorized access or manipulation of web requests.

CWE

CWE-444

Affected Products

Red Hat Red Hat build of Apache Camel for Spring Boot 4Red Hat Red Hat build of Apache Camel - HawtIO 4Red Hat Red Hat Data Grid 8Red Hat Red Hat Enterprise Linux 10Red Hat Red Hat Enterprise Linux 8Red Hat Red Hat Enterprise Linux 9Red Hat Red Hat Fuse 7Red Hat Red Hat JBoss Enterprise Application Platform 7Red Hat Red Hat JBoss Enterprise Application Platform 8Red Hat Red Hat JBoss Enterprise Application Platform Expansion Pack

References