Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66373: n/a

0
Medium
VulnerabilityCVE-2025-66373cvecve-2025-66373
Published: Thu Dec 04 2025 (12/04/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Akamai Ghost on Akamai CDN edge servers before 2025-11-17 has a chunked request body processing error that can result in HTTP request smuggling. When Akamai Ghost receives an invalid chunked body that includes a chunk size different from the actual size of the following chunk data, under certain circumstances, Akamai Ghost erroneously forwards the invalid request and subsequent superfluous bytes to the origin server. An attacker could hide a smuggled request in these superfluous bytes. Whether this is exploitable depends on the origin server's behavior and how it processes the invalid request it receives from Akamai Ghost.

AI-Powered Analysis

AILast updated: 12/11/2025, 21:57:26 UTC

Technical Analysis

CVE-2025-66373 is a vulnerability in Akamai Ghost, a component running on Akamai CDN edge servers, that mishandles HTTP chunked transfer encoding. Specifically, when Akamai Ghost receives an HTTP request with a chunked body where the declared chunk size differs from the actual size of the chunk data, it incorrectly forwards the malformed request along with additional superfluous bytes to the origin server. This behavior can be exploited for HTTP request smuggling (CWE-444), where an attacker crafts a request that is interpreted differently by the CDN and the origin server, allowing the attacker to inject hidden or smuggled requests. The success of such an attack depends on the origin server's parsing logic and its tolerance for malformed chunked requests. The vulnerability has a CVSS v3.1 base score of 4.8, indicating medium severity, with network attack vector, high attack complexity, no privileges required, no user interaction, and impacts on confidentiality and integrity but not availability. No public exploits are known yet, and no patches have been linked, suggesting that mitigation currently relies on monitoring and configuration hardening. The vulnerability was published on December 4, 2025, and affects versions of Akamai Ghost prior to November 17, 2025.

Potential Impact

For European organizations relying on Akamai CDN services, this vulnerability could allow attackers to perform HTTP request smuggling attacks, potentially bypassing security controls, injecting unauthorized requests, or manipulating web traffic confidentiality and integrity. This could lead to session hijacking, cache poisoning, web application firewall bypass, or unauthorized access to sensitive data. The impact is particularly concerning for organizations handling sensitive or regulated data, such as financial institutions, healthcare providers, and government agencies. However, the actual impact depends on the origin server's behavior and its ability to handle malformed chunked requests securely. Since the vulnerability does not affect availability directly and requires high attack complexity, the risk is moderate but should not be underestimated given the widespread use of Akamai CDN in Europe.

Mitigation Recommendations

1. Monitor Akamai's official advisories and apply patches or updates to Akamai Ghost as soon as they become available to address this vulnerability. 2. Review and harden origin server configurations to reject or safely handle malformed chunked HTTP requests, minimizing the risk of request smuggling. 3. Implement strict input validation and HTTP request parsing on origin servers to detect and block suspicious chunked transfer encoding anomalies. 4. Employ Web Application Firewalls (WAFs) with updated rules capable of detecting HTTP request smuggling attempts. 5. Conduct regular security assessments and penetration testing focusing on HTTP request smuggling scenarios to identify potential weaknesses. 6. Consider deploying additional monitoring and anomaly detection on CDN traffic to identify unusual request patterns indicative of exploitation attempts. 7. Coordinate with Akamai support to understand any interim mitigations or configuration changes that can reduce exposure before patches are applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-28T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6931bd5b6ade94f1c7900e34

Added to database: 12/4/2025, 4:56:59 PM

Last enriched: 12/11/2025, 9:57:26 PM

Last updated: 1/18/2026, 3:53:03 PM

Views: 131

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats