CVE-2026-28367
⚠️ highSummary
A flaw was found in Undertow. A remote attacker can exploit this vulnerability by sending `\r\r\r` as a header block terminator. This can be used for request smuggling with certain proxy servers, such as older versions of Apache Traffic Server and Google Cloud Classic Application Load Balancer, potentially leading to unauthorized access or manipulation of web requests.
CVSS Score
8.7
High
EPSS Score
0.0
Exploit Probability
Published Date
2026-03-27
First Seen: 2026-03-28
📊 Relative Risk Intelligence
This CVE is High Risk - more severe than 81.1% of all 318,071 vulnerabilities in our database.
#60,199
Top 25% most severe
Severity Percentile
🎯 CISA SSVC Assessment Updated: Mar 31, 2026
🔍 Exploitation Status
None
No known exploits
⚙️ Automatable
NO
Requires human interaction
💥 Technical Impact
Total
Complete system compromise possible
SSVC data provided by
CISA
Last Modified
2026-04-10
Source
NVD 🔗
CVSS Vector 3.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
CWE IDs (Weakness Types)