Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9w88-79f8-m3vp | Permissive List of Allowed Inputs in ewe |
Mon, 23 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:vshakitskiy:ewe:*:*:*:*:*:*:*:* |
Fri, 20 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vshakitskiy
Vshakitskiy ewe |
|
| Vendors & Products |
Vshakitskiy
Vshakitskiy ewe |
Fri, 20 Mar 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ewe is a Gleam web server. ewe is a Gleam web server. Versions 0.6.0 through 3.0.4 are vulnerable to authentication bypass or spoofed proxy-trust headers. Chunked transfer encoding trailer handling merges declared trailer fields into req.headers after body parsing, but the denylist only blocks 9 header names. A malicious client can exploit this by declaring these headers in the Trailer field and appending them after the final chunk, causing request.set_header to overwrite legitimate values (e.g., those set by a reverse proxy). This enables attackers to forge authentication credentials, hijack sessions, bypass IP-based rate limiting, or spoof proxy-trust headers in any downstream middleware that reads headers after ewe.read_body is called. This issue has been fixed in version 3.0.5. | |
| Title | ewe has an Overly Permissive List of Allowed Inputs | |
| Weaknesses | CWE-183 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T20:03:41.064Z
Reserved: 2026-03-16T21:03:44.420Z
Link: CVE-2026-32881
Updated: 2026-03-20T20:03:37.662Z
Status : Analyzed
Published: 2026-03-20T02:16:36.237
Modified: 2026-03-23T17:03:15.093
Link: CVE-2026-32881
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:10:09Z
Github GHSA