Skip to main content

CVE-2026-1527

CVE Details

Visit the official vulnerability details page for CVE-2026-1527 to learn more.

Initial Publication

03/12/2026

Last Update

03/20/2026

Third Party Dependency

undici

NIST CVE Summary

ImpactWhen an application passes user-controlled input to the upgrade option of client.request(), an attacker can inject CRLF sequences (\r\n) to:

  • Inject arbitrary HTTP headers
  • Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch) The vulnerability exists because undici writes the upgrade value directly to the socket without validating for invalid header characters:

// lib/dispatcher/client-h1.js:1121 if (upgrade) { header += `connection: upgrade\r\nupgrade: ${upgrade}\r\n` }

CVE Severity

4.6

Our Official Summary

Investigation is ongoing to determine how this vulnerability affects our products.

Status

Analyzed

Affected Products & Versions

VersionPaletteAIPaletteAI VerteX
1.0.7⚠️ Impacted⚠️ Impacted

Revision History

No revisions available.