Medium severity5.9NVD Advisory· Published Mar 30, 2026· Updated May 14, 2026
CVE-2026-5119
CVE-2026-5119
Description
A flaw was found in libsoup. When establishing HTTPS tunnels through a configured HTTP proxy, sensitive session cookies are transmitted in cleartext within the initial HTTP CONNECT request. A network-positioned attacker or a malicious HTTP proxy can intercept these cookies, leading to potential session hijacking or user impersonation.
Affected products
5- cpe:2.3:a:gnome:libsoup:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- gitlab.gnome.org/GNOME/libsoup/-/issues/502nvdExploitIssue Tracking
- access.redhat.com/security/cve/CVE-2026-5119nvdMitigationVendor Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingVendor Advisory
- access.redhat.com/errata/RHSA-2026:13978nvd
- access.redhat.com/errata/RHSA-2026:14087nvd
- access.redhat.com/errata/RHSA-2026:15968nvd
- access.redhat.com/errata/RHSA-2026:17482nvd
News mentions
0No linked articles in our index yet.