A Heap Use-After-Free vulnerability was found in the queue item management logic of the libsoup HTTP client library. The flaw occurs when a queued message is “finished” twice under specific timing conditions during asynchronous read operations. When the run_until_read_done() function attempts to finalize an already-finished item, memory previously freed is accessed again, resulting in undefined behavior or a crash. This condition can be triggered remotely via crafted HTTP/2 request sequences or abrupt connection terminations. Exploitation does not require authentication or user interaction, and can lead to application crashes or denial of service in software using libsoup for network communications.