CVE-2026-33490
EUVD-2026-1628326.03.2026, 18:16
H3 is a minimal H(TTP) framework. In versions 2.0.0-0 through 2.0.1-rc.16, the `mount()` method in h3 uses a simple `startsWith()` check to determine whether incoming requests fall under a mounted sub-application's path prefix. Because this check does not verify a path segment boundary (i.e., that the next character after the base is `/` or end-of-string), middleware registered on a mount like `/admin` will also execute for unrelated routes such as `/admin-public`, `/administrator`, or `/adminstuff`. This allows an attacker to trigger context-setting middleware on paths it was never intended to cover, potentially polluting request context with unintended privilege flags. Version 2.0.2-rc.17 contains a patch.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| h3 | h3 | 2.0.1:rc1 |
| h3 | h3 | 2.0.1:rc10 |
| h3 | h3 | 2.0.1:rc11 |
| h3 | h3 | 2.0.1:rc12 |
| h3 | h3 | 2.0.1:rc13 |
| h3 | h3 | 2.0.1:rc14 |
| h3 | h3 | 2.0.1:rc15 |
| h3 | h3 | 2.0.1:rc16 |
| h3 | h3 | 2.0.1:rc2 |
| h3 | h3 | 2.0.1:rc3 |
| h3 | h3 | 2.0.1:rc4 |
| h3 | h3 | 2.0.1:rc5 |
| h3 | h3 | 2.0.1:rc6 |
| h3 | h3 | 2.0.1:rc7 |
| h3 | h3 | 2.0.1:rc8 |
| h3 | h3 | 2.0.1:rc9 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration