Description
A flaw was found in libsoup. When establishing HTTPS tunnels through a configured HTTP proxy, sensitive session cookies are transmitted in cleartext within the initial HTTP CONNECT request. A network-positioned attacker or a malicious HTTP proxy can intercept these cookies, leading to potential session hijacking or user impersonation.
Published: 2026-03-30
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

A flaw in the libsoup library causes sensitive session cookies to be sent in cleartext when establishing HTTPS tunnels through a configured HTTP proxy. The cleartext cookie data is included in the initial HTTP CONNECT request. An attacker positioned on the network or operating a malicious proxy could intercept these cookies, enabling session hijacking or user impersonation. The weakness is categorized as CWE‑319, which highlights the exposure of cryptographic keys or secrets over an insecure channel.

Affected Systems

The vulnerability affects Red Hat Enterprise Linux releases 6 through 10 that utilize libsoup. All packages derived from these RHEL distributions could inherit the flaw, as no specific libsoup version is cited. The issue is also known in the GNOME libsoup component, but the primary impact is on RHEL users.

Risk and Exploitability

The CVSS score of 5.9 indicates moderate severity. The EPSS score is below 1 %, suggesting a low likelihood of exploitation in the wild at this time, and the vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. The likely attack vector is a network-positioned attacker able to observe or control the HTTP proxy traffic. While exploitation requires the attacker to either compromise or proxy the HTTPS tunnel, it can be performed by a malicious or misconfigured proxy, which is inferred from the description.

Generated by OpenCVE AI on April 2, 2026 at 04:58 UTC.

Remediation

Vendor Workaround

To mitigate this issue, ensure that all HTTP proxies used for HTTPS tunnels are trusted and operate within a secure network. Avoid configuring applications to use untrusted HTTP proxies. If feasible, configure applications to bypass proxies for sensitive connections or utilize a secure proxy solution that encrypts the entire communication channel. A service restart or application reload may be required for changes to take effect.


OpenCVE Recommended Actions

  • Apply the latest Red Hat security updates for libsoup to eliminate the flaw
  • Configure applications to avoid using untrusted HTTP proxies for HTTPS tunneling
  • Where feasible, bypass proxies for sensitive connections or use a secure proxy that encrypts the entire communication channel
  • Restart or reload affected services so the configuration changes take effect
  • Monitor network traffic for cleartext transmission of session cookies

Generated by OpenCVE AI on April 2, 2026 at 04:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
cpe:/a:redhat:enterprise_linux:8::appstream
cpe:/a:redhat:enterprise_linux:9::appstream
cpe:/o:redhat:enterprise_linux:8::baseos
References

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Gnome
Gnome libsoup
CPEs cpe:2.3:a:gnome:libsoup:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Vendors & Products Gnome
Gnome libsoup

Mon, 30 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 30 Mar 2026 06:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in libsoup. When establishing HTTPS tunnels through a configured HTTP proxy, sensitive session cookies are transmitted in cleartext within the initial HTTP CONNECT request. A network-positioned attacker or a malicious HTTP proxy can intercept these cookies, leading to potential session hijacking or user impersonation.
Title Libsoup: libsoup: information disclosure via cleartext transmission of cookies during https tunnel establishment
First Time appeared Redhat
Redhat enterprise Linux
Weaknesses CWE-319
CPEs cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N'}


Subscriptions

Gnome Libsoup
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-05-06T14:52:53.104Z

Reserved: 2026-03-30T05:13:41.920Z

Link: CVE-2026-5119

cve-icon Vulnrichment

Updated: 2026-03-30T16:00:57.729Z

cve-icon NVD

Status : Modified

Published: 2026-03-30T07:15:58.350

Modified: 2026-05-06T16:16:11.060

Link: CVE-2026-5119

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-30T05:30:32Z

Links: CVE-2026-5119 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:54:23Z

Weaknesses