CVE-2026-33129

medium

Description

H3 is a minimal H(TTP) framework. Versions 2.0.1-beta.0 through 2.0.0-rc.8 contain a Timing Side-Channel vulnerability in the requireBasicAuth function due to the use of unsafe string comparison (!==). This allows an attacker to deduce the valid password character-by-character by measuring the server's response time, effectively bypassing password complexity protections. This issue is fixed in version 2.0.1-rc.9.

References

https://github.com/h3js/h3/security/advisories/GHSA-26f5-8h2x-34xh

https://github.com/h3js/h3/releases/tag/v2.0.1-rc.9

https://github.com/h3js/h3/pull/1283

Details

Source: Mitre, NVD

Published: 2026-03-20

Updated: 2026-03-20

Risk Information

CVSS v2

Base Score: 5.4

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 5.9

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Severity: Medium

EPSS

EPSS: 0.00029