A denial-of-service vulnerability due to improper input validation allows a remote attacker to crash the service via a malformed HTTP header.
Allows crashing the process with data coming from the network when used with, for example, an HTTP server. Most common way of using Swift W3C Trace Context is through Swift OTel.
https://github.com/swift-otel/swift-w3c-trace-context/commit/5da9b143ba6046734de3fa51dafea28290174e4e
Disable either Swift OTel or the code that extracts the trace information from an incoming header (such as a TracingMiddleware).
{
"nvd_published_at": "2026-01-19T21:15:52Z",
"github_reviewed_at": "2026-01-21T01:05:09Z",
"severity": "MODERATE",
"cwe_ids": [
"CWE-20"
],
"github_reviewed": true
}