CVE-2026-1527
EUVD-2026-1170112.03.2026, 21:16
ImpactWhen an application passes user-controlled input to the upgrade option of client.request(), an attacker can inject CRLF sequences (\r\n) to:
* Inject arbitrary HTTP headers
* Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch)
The vulnerability exists because undici writes the upgrade value directly to the socket without validating for invalid header characters:
// lib/dispatcher/client-h1.js:1121
if (upgrade) {
header += `connection: upgrade\r\nupgrade: ${upgrade}\r\n`
}Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| nodejs | undici | 𝑥 < 6.24.0 |
| nodejs | undici | 7.0.0 ≤ 𝑥 < 7.24.0 |
𝑥
= Vulnerable software versions
Ubuntu Releases