Swift W3C TraceContext vulnerable to a malformed HTTP header causing a crash
Moderate severity
GitHub Reviewed
Published
Jan 19, 2026
in
swift-otel/swift-w3c-trace-context
•
Updated Jan 21, 2026
Description
Published by the National Vulnerability Database
Jan 19, 2026
Published to the GitHub Advisory Database
Jan 21, 2026
Reviewed
Jan 21, 2026
Last updated
Jan 21, 2026
Impact
A denial-of-service vulnerability due to improper input validation allows a remote attacker to crash the service via a malformed HTTP header.
Allows crashing the process with data coming from the network when used with, for example, an HTTP server. Most common way of using Swift W3C Trace Context is through Swift OTel.
Patches
swift-otel/swift-w3c-trace-context@5da9b14
Workarounds
Disable either Swift OTel or the code that extracts the trace information from an incoming header (such as a
TracingMiddleware).References
Swift W3C TraceContext 1.0.0-beta.5
Swift OTel 1.0.4
References