H3 is a minimal H(TTP) framework. Versions 2.0.1-beta.0 through 2.0.0-rc.8 contain a Timing Side-Channel vulnerability in the requireBasicAuth function due to the use of unsafe string comparison (!==). This allows an attacker to deduce the valid password character-by-character by measuring the server's response time, effectively bypassing password complexity protections. This issue is fixed in version 2.0.1-rc.9.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-26f5-8h2x-34xh h3 has an observable timing discrepancy in basic auth utils
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
Description H3 is a minimal H(TTP) framework. Versions 2.0.1-beta.0 through 2.0.0-rc.8 contain a Timing Side-Channel vulnerability in the requireBasicAuth function due to the use of unsafe string comparison (!==). This allows an attacker to deduce the valid password character-by-character by measuring the server's response time, effectively bypassing password complexity protections. This issue is fixed in version 2.0.1-rc.9.
Title h3 has an observable timing discrepancy in basic auth utils
Weaknesses CWE-208
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T09:41:21.933Z

Reserved: 2026-03-17T20:35:49.927Z

Link: CVE-2026-33129

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-20T10:16:19.317

Modified: 2026-03-20T10:16:19.317

Link: CVE-2026-33129

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses