CRLF injection vulnerability in the soup_message_headers_set_content_disposition() function of the libsoup HTTP library. The issue occurs because this function internally uses soup_message_headers_append_common(), which does not enforce character restrictions on header values. As a result, an attacker who can control the input used for the Content-Disposition header can inject CRLF sequences into the header value. When the HTTP request or response is later constructed, these sequences are interpreted verbatim, allowing arbitrary HTTP headers to be injected. This can lead to header injection or HTTP response splitting without authentication or user interaction.