{"data":{"id":"fa57d03b-f2f8-4dec-bcb3-f8a1ccf4265b","title":"GHSA-4hxc-9384-m385: h3: SSE Event Injection via Unsanitized Carriage Return (`\\r`) in EventStream Data and Comment Fields (Bypass of CVE Fix)","summary":"The h3 library's EventStream class fails to remove carriage return characters (`\\r`, a line break in the Server-Sent Events protocol) from `data` and `comment` fields, allowing attackers to inject fake events or split a single message into multiple events that browsers parse separately. This bypasses a previous fix that only removed newline characters (`\\n`).","solution":"N/A -- no mitigation discussed in source.","labels":["security"],"sourceUrl":"https://github.com/advisories/GHSA-4hxc-9384-m385","publishedAt":"2026-03-20T20:50:38.000Z","cveId":null,"cweIds":null,"cvssScore":null,"cvssSeverity":"medium","severity":"medium","attackType":["rag_poisoning"],"issueType":"vulnerability","affectedPackages":["h3@< 1.15.9 (fixed: 1.15.9)","h3@>= 2.0.0-beta.0, <= 2.0.1-rc.16 (fixed: 2.0.1-rc.17)"],"affectedVendors":["LangChain"],"affectedVendorsRaw":["h3"],"classifierModel":"claude-haiku-4-5-20251001","classifierPromptVersion":"v3","cvssVector":null,"attackVector":null,"attackComplexity":null,"privilegesRequired":null,"userInteraction":null,"exploitMaturity":null,"epssScore":null,"patchAvailable":true,"disclosureDate":"2026-03-20T20:50:38.000Z","capecIds":null,"crossRefCount":0,"attackSophistication":"moderate","impactType":["integrity"],"aiComponentTargeted":"api","llmSpecific":false,"classifierConfidence":0.85,"researchCategory":null,"atlasIds":null}}