Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3vj8-jmxq-cgj5 | h3 has a middleware bypass with one gadget |
Fri, 20 Mar 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
H3
H3 h3 |
|
| CPEs | cpe:2.3:a:h3:h3:2.0.0:*:*:*:*:node.js:*:* cpe:2.3:a:h3:h3:2.0.1:rc10:*:*:*:node.js:*:* cpe:2.3:a:h3:h3:2.0.1:rc11:*:*:*:node.js:*:* cpe:2.3:a:h3:h3:2.0.1:rc12:*:*:*:node.js:*:* cpe:2.3:a:h3:h3:2.0.1:rc13:*:*:*:node.js:*:* cpe:2.3:a:h3:h3:2.0.1:rc14:*:*:*:node.js:*:* cpe:2.3:a:h3:h3:2.0.1:rc2:*:*:*:node.js:*:* cpe:2.3:a:h3:h3:2.0.1:rc3:*:*:*:node.js:*:* cpe:2.3:a:h3:h3:2.0.1:rc4:*:*:*:node.js:*:* cpe:2.3:a:h3:h3:2.0.1:rc5:*:*:*:node.js:*:* cpe:2.3:a:h3:h3:2.0.1:rc6:*:*:*:node.js:*:* cpe:2.3:a:h3:h3:2.0.1:rc7:*:*:*:node.js:*:* cpe:2.3:a:h3:h3:2.0.1:rc8:*:*:*:node.js:*:* cpe:2.3:a:h3:h3:2.0.1:rc9:*:*:*:node.js:*:* |
|
| Vendors & Products |
H3
H3 h3 |
Fri, 20 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
H3js
H3js h3 |
|
| Vendors & Products |
H3js
H3js h3 |
Fri, 20 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | H3 is a minimal H(TTP) framework. Versions 2.0.0-0 through 2.0.1-rc.14 contain a Host header spoofing vulnerability in the NodeRequestUrl (which extends FastURL) which allows middleware bypass. When event.url, event.url.hostname, or event.url._url is accessed, such as in a logging middleware, the _url getter constructs a URL from untrusted data, including the user-controlled Host header. Because H3's router resolves the route handler before middleware runs, an attacker can supply a crafted Host header (e.g., Host: localhost:3000/abchehe?) to make the middleware path check fail while the route handler still matches, effectively bypassing authentication or authorization middleware. This affects any application built on H3 (including Nitro/Nuxt) that accesses event.url properties in middleware guarding sensitive routes. The issue requires an immediate fix to prevent FastURL.href from being constructed with unsanitized, attacker-controlled input. Version 2.0.1-rc.15 contains a patch for this issue. | |
| Title | h3 has a middleware bypass with one gadget | |
| Weaknesses | CWE-290 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T11:25:53.880Z
Reserved: 2026-03-17T20:35:49.927Z
Link: CVE-2026-33131
Updated: 2026-03-20T11:25:38.802Z
Status : Analyzed
Published: 2026-03-20T11:18:02.700
Modified: 2026-03-20T19:45:14.473
Link: CVE-2026-33131
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:29:34Z
Github GHSA