Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2835: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in Cloudflare https://github.com/cloudflare/pingora

0
Critical
VulnerabilityCVE-2026-2835cvecve-2026-2835cwe-444
Published: Wed Mar 04 2026 (03/04/2026, 23:32:41 UTC)
Source: CVE Database V5
Vendor/Project: Cloudflare
Product: https://github.com/cloudflare/pingora

Description

An HTTP Request Smuggling vulnerability (CWE-444) has been found in Pingora's parsing of HTTP/1.0 and Transfer-Encoding requests. The issue occurs due to improperly allowing HTTP/1.0 request bodies to be close-delimited and incorrect handling of multiple Transfer-Encoding values, allowing attackers to send HTTP/1.0 requests in a way that would desync Pingora’s request framing from backend servers’. Impact This vulnerability primarily affects standalone Pingora deployments in front of certain backends that accept HTTP/1.0 requests. An attacker could craft a malicious payload following this request that Pingora forwards to the backend in order to: * Bypass proxy-level ACL controls and WAF logic * Poison caches and upstream connections, causing subsequent requests from legitimate users to receive responses intended for smuggled requests * Perform cross-user attacks by hijacking sessions or smuggling requests that appear to originate from the trusted proxy IP Cloudflare's CDN infrastructure was not affected by this vulnerability, as its ingress proxy layers forwarded HTTP/1.1 requests only, rejected ambiguous framing such as invalid Content-Length values, and forwarded a single Transfer-Encoding: chunked header for chunked requests. Mitigation: Pingora users should upgrade to Pingora v0.8.0 or higher that fixes this issue by correctly parsing message length headers per RFC 9112 and strictly adhering to more RFC guidelines, including that HTTP request bodies are never close-delimited. As a workaround, users can reject certain requests with an error in the request filter logic in order to stop processing bytes on the connection and disable downstream connection reuse. The user should reject any non-HTTP/1.1 request, or a request that has invalid Content-Length, multiple Transfer-Encoding headers, or Transfer-Encoding header that is not an exact “chunked” string match.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/12/2026, 20:22:27 UTC

Technical Analysis

CVE-2026-2835 is an HTTP Request Smuggling vulnerability classified under CWE-444, discovered in Cloudflare's Pingora HTTP parser prior to version 0.8.0. The flaw stems from Pingora's incorrect handling of HTTP/1.0 request bodies, which it improperly allows to be close-delimited, and its flawed processing of multiple Transfer-Encoding headers. This leads to a desynchronization between Pingora’s interpretation of HTTP request framing and that of backend servers. Specifically, attackers can craft HTTP/1.0 requests with ambiguous or conflicting length indicators that cause Pingora to parse requests differently than the backend, enabling the injection of smuggled requests. This discrepancy can be exploited to bypass proxy-level access control lists (ACLs) and Web Application Firewall (WAF) protections, poison caches and upstream connections so that legitimate users receive malicious responses, and perform cross-user attacks by hijacking sessions or injecting requests that appear to originate from the trusted proxy IP address. Cloudflare’s own CDN infrastructure is not vulnerable because it strictly enforces HTTP/1.1 requests, rejects ambiguous framing such as invalid Content-Length headers, and only forwards a single Transfer-Encoding: chunked header for chunked requests. The vulnerability is rated critical with a CVSS 4.0 score of 9.3, reflecting its network attack vector, low complexity, no required privileges or user interaction, and high impact on integrity and availability. Mitigation involves upgrading to Pingora version 0.8.0 or later, which corrects the parsing logic to fully comply with RFC 9112, ensuring HTTP request bodies are never close-delimited and that Transfer-Encoding headers are strictly validated. As a temporary workaround, users can implement request filtering to reject non-HTTP/1.1 requests, requests with invalid Content-Length headers, multiple Transfer-Encoding headers, or Transfer-Encoding headers that do not exactly match “chunked”. This reduces the risk by preventing ambiguous request framing and disabling downstream connection reuse.

Potential Impact

The impact of CVE-2026-2835 is significant for organizations deploying standalone Pingora proxies in front of backend servers that accept HTTP/1.0 requests. Successful exploitation can allow attackers to bypass critical security controls such as ACLs and WAFs, undermining perimeter defenses. Cache poisoning and upstream connection poisoning can lead to widespread distribution of malicious or stale content to legitimate users, damaging trust and potentially enabling further attacks. Cross-user attacks facilitated by request smuggling can result in session hijacking, unauthorized actions, and data leakage. The vulnerability affects the integrity and availability of web services and can compromise confidentiality indirectly through session hijacking. Since no authentication or user interaction is required and the attack can be launched remotely over the network, the attack surface is broad. Although Cloudflare’s CDN is not affected, organizations using Pingora in custom or standalone deployments face a high risk. The absence of known exploits in the wild currently limits immediate threat but the critical severity and ease of exploitation mean attackers may develop exploits rapidly. The vulnerability could disrupt business operations, damage reputation, and lead to data breaches if unmitigated.

Mitigation Recommendations

To mitigate CVE-2026-2835, organizations should immediately upgrade all Pingora deployments to version 0.8.0 or later, which includes a fix that enforces strict RFC 9112-compliant parsing of HTTP message length headers and disallows close-delimited HTTP/1.0 request bodies. This upgrade is the most effective and comprehensive solution. As an interim measure, implement request filtering rules to reject any HTTP requests that are not HTTP/1.1, contain invalid or conflicting Content-Length headers, have multiple Transfer-Encoding headers, or have Transfer-Encoding headers that do not exactly match “chunked”. Additionally, disable downstream connection reuse to prevent persistent connection exploitation. Network monitoring should be enhanced to detect anomalous HTTP request patterns indicative of request smuggling attempts. Backend servers should be configured to reject ambiguous or malformed HTTP/1.0 requests where possible. Regularly audit proxy and backend configurations to ensure consistent HTTP parsing behavior and alignment with RFC standards. Finally, maintain awareness of threat intelligence updates for any emerging exploits targeting this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
cloudflare
Date Reserved
2026-02-19T21:24:24.726Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a8c4c1d1a09e29cb83c419

Added to database: 3/4/2026, 11:48:17 PM

Last enriched: 3/12/2026, 8:22:27 PM

Last updated: 4/19/2026, 7:26:25 AM

Views: 222

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses