CVE-2026-34715
ewe Has Improper Neutralization of CRLF Sequences in HTTP Headers (HTTP Request/Response Splitting)
ewe is a Gleam web server. Prior to version 3.0.6, the encode_headers function in src/ewe/internal/encoder.gleam directly interpolates response header keys and values into raw HTTP bytes without validating or stripping CRLF (\r\n) sequences. An application that passes user-controlled data into response headers (e.g., setting a Location redirect header from a request parameter) allows an attacker to inject arbitrary HTTP response content, leading to response splitting, cache poisoning, and possible cross-site scripting. Notably, ewe does validate CRLF in incoming request headers via validate_field_value() in the HTTP/1.1 parser โ but provides no equivalent protection for outgoing response headers in the encoder. This issue has been patched in version 3.0.6.
| CWE | CWE-113 |
| Vendor | vshakitskiy |
| Product | ewe |
| Published | Apr 2, 2026 |
| Last Updated | Apr 3, 2026 |
Get instant alerts for vshakitskiy ewe
Be the first to know when new medium vulnerabilities affecting vshakitskiy ewe are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N