CVE-2026-28368

EUVD-2026-16696
A flaw was found in Undertow. This vulnerability allows a remote attacker to construct specially crafted requests where header names are parsed differently by Undertow compared to upstream proxies. This discrepancy in header interpretation can be exploited to launch request smuggling attacks, potentially bypassing security controls and accessing unauthorized resources.
HTTP Request/Response Smuggling
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 9%
Affected Products (NVD)
VendorProductVersion
redhatbuild_of_apache_camel_-_hawtio
4.0
redhatbuild_of_apache_camel_for_spring_boot
4.0
redhatdata_grid
8.0
redhatfuse
7.0.0
redhatjboss_enterprise_application_platform
7.0.0
redhatjboss_enterprise_application_platform
8.0.0
redhatjboss_enterprise_application_platform_expansion_pack
-
redhatprocess_automation
7.0
redhatsingle_sign-on
7.0
redhatundertow
-
redhatenterprise_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
undertow
forky
vulnerable
sid
vulnerable