CRLF Injection Affecting h3 package, versions <1.15.6>=2.0.0 <2.0.1-rc.15


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about CRLF Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-H3-15692480
  • published19 Mar 2026
  • disclosed18 Mar 2026
  • credit0xkakash1

Introduced: 18 Mar 2026

NewCVE-2026-33128  (opens in a new tab)
CWE-93  (opens in a new tab)

How to fix?

Upgrade h3 to version 1.15.6, 2.0.1-rc.15 or higher.

Overview

h3 is a Minimal H(TTP) framework built for high performance and portability.

Affected versions of this package are vulnerable to CRLF Injection via unsanitized input in the formatEventStreamMessage and formatEventStreamComment functions. An attacker can inject arbitrary Server-Sent Events (SSE) fields or events to connected clients by supplying newline characters in the id, event, data, or comment fields, which can lead to cross-user content injection, phishing, event spoofing, forced client reconnections, or manipulation of event replay behavior.

CVSS Base Scores

version 4.0
version 3.1