An out-of-bounds read vulnerability exists in the process_frame() function of libsoup’s SoupWebSocketConnection. When max_incoming_payload_size is explicitly set to 0, improper bounds handling allows the function to read beyond the allocated buffer while processing WebSocket frames. This condition can lead to memory disclosure or application instability. Exploitation requires a non-default configuration and a remote attacker capable of sending crafted WebSocket frames.