CVE-2026-2835: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in Cloudflare https://github.com/cloudflare/pingora
An HTTP Request Smuggling vulnerability (CWE-444) has been found in Pingora's parsing of HTTP/1.0 and Transfer-Encoding requests. The issue occurs due to improperly allowing HTTP/1.0 request bodies to be close-delimited and incorrect handling of multiple Transfer-Encoding values, allowing attackers to send HTTP/1.0 requests in a way that would desync Pingora’s request framing from backend servers’. Impact This vulnerability primarily affects standalone Pingora deployments in front of certain backends that accept HTTP/1.0 requests. An attacker could craft a malicious payload following this request that Pingora forwards to the backend in order to: * Bypass proxy-level ACL controls and WAF logic * Poison caches and upstream connections, causing subsequent requests from legitimate users to receive responses intended for smuggled requests * Perform cross-user attacks by hijacking sessions or smuggling requests that appear to originate from the trusted proxy IP Cloudflare's CDN infrastructure was not affected by this vulnerability, as its ingress proxy layers forwarded HTTP/1.1 requests only, rejected ambiguous framing such as invalid Content-Length values, and forwarded a single Transfer-Encoding: chunked header for chunked requests. Mitigation: Pingora users should upgrade to Pingora v0.8.0 or higher that fixes this issue by correctly parsing message length headers per RFC 9112 and strictly adhering to more RFC guidelines, including that HTTP request bodies are never close-delimited. As a workaround, users can reject certain requests with an error in the request filter logic in order to stop processing bytes on the connection and disable downstream connection reuse. The user should reject any non-HTTP/1.1 request, or a request that has invalid Content-Length, multiple Transfer-Encoding headers, or Transfer-Encoding header that is not an exact “chunked” string match.
AI Analysis
Technical Summary
CVE-2026-2835 is an HTTP Request Smuggling vulnerability classified under CWE-444, discovered in Cloudflare's Pingora HTTP parser prior to version 0.8.0. The flaw stems from Pingora's incorrect handling of HTTP/1.0 request bodies, which it improperly allows to be close-delimited, and its flawed processing of multiple Transfer-Encoding headers. This leads to a desynchronization between Pingora’s interpretation of HTTP request framing and that of backend servers. Specifically, attackers can craft HTTP/1.0 requests with ambiguous or conflicting length indicators that cause Pingora to parse requests differently than the backend, enabling the injection of smuggled requests. This discrepancy can be exploited to bypass proxy-level access control lists (ACLs) and Web Application Firewall (WAF) protections, poison caches and upstream connections so that legitimate users receive malicious responses, and perform cross-user attacks by hijacking sessions or injecting requests that appear to originate from the trusted proxy IP address. Cloudflare’s own CDN infrastructure is not vulnerable because it strictly enforces HTTP/1.1 requests, rejects ambiguous framing such as invalid Content-Length headers, and only forwards a single Transfer-Encoding: chunked header for chunked requests. The vulnerability is rated critical with a CVSS 4.0 score of 9.3, reflecting its network attack vector, low complexity, no required privileges or user interaction, and high impact on integrity and availability. Mitigation involves upgrading to Pingora version 0.8.0 or later, which corrects the parsing logic to fully comply with RFC 9112, ensuring HTTP request bodies are never close-delimited and that Transfer-Encoding headers are strictly validated. As a temporary workaround, users can implement request filtering to reject non-HTTP/1.1 requests, requests with invalid Content-Length headers, multiple Transfer-Encoding headers, or Transfer-Encoding headers that do not exactly match “chunked”. This reduces the risk by preventing ambiguous request framing and disabling downstream connection reuse.
Potential Impact
The impact of CVE-2026-2835 is significant for organizations deploying standalone Pingora proxies in front of backend servers that accept HTTP/1.0 requests. Successful exploitation can allow attackers to bypass critical security controls such as ACLs and WAFs, undermining perimeter defenses. Cache poisoning and upstream connection poisoning can lead to widespread distribution of malicious or stale content to legitimate users, damaging trust and potentially enabling further attacks. Cross-user attacks facilitated by request smuggling can result in session hijacking, unauthorized actions, and data leakage. The vulnerability affects the integrity and availability of web services and can compromise confidentiality indirectly through session hijacking. Since no authentication or user interaction is required and the attack can be launched remotely over the network, the attack surface is broad. Although Cloudflare’s CDN is not affected, organizations using Pingora in custom or standalone deployments face a high risk. The absence of known exploits in the wild currently limits immediate threat but the critical severity and ease of exploitation mean attackers may develop exploits rapidly. The vulnerability could disrupt business operations, damage reputation, and lead to data breaches if unmitigated.
Mitigation Recommendations
To mitigate CVE-2026-2835, organizations should immediately upgrade all Pingora deployments to version 0.8.0 or later, which includes a fix that enforces strict RFC 9112-compliant parsing of HTTP message length headers and disallows close-delimited HTTP/1.0 request bodies. This upgrade is the most effective and comprehensive solution. As an interim measure, implement request filtering rules to reject any HTTP requests that are not HTTP/1.1, contain invalid or conflicting Content-Length headers, have multiple Transfer-Encoding headers, or have Transfer-Encoding headers that do not exactly match “chunked”. Additionally, disable downstream connection reuse to prevent persistent connection exploitation. Network monitoring should be enhanced to detect anomalous HTTP request patterns indicative of request smuggling attempts. Backend servers should be configured to reject ambiguous or malformed HTTP/1.0 requests where possible. Regularly audit proxy and backend configurations to ensure consistent HTTP parsing behavior and alignment with RFC standards. Finally, maintain awareness of threat intelligence updates for any emerging exploits targeting this vulnerability.
Affected Countries
United States, United Kingdom, Germany, France, Japan, South Korea, Australia, Canada, Netherlands, Singapore
CVE-2026-2835: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in Cloudflare https://github.com/cloudflare/pingora
Description
An HTTP Request Smuggling vulnerability (CWE-444) has been found in Pingora's parsing of HTTP/1.0 and Transfer-Encoding requests. The issue occurs due to improperly allowing HTTP/1.0 request bodies to be close-delimited and incorrect handling of multiple Transfer-Encoding values, allowing attackers to send HTTP/1.0 requests in a way that would desync Pingora’s request framing from backend servers’. Impact This vulnerability primarily affects standalone Pingora deployments in front of certain backends that accept HTTP/1.0 requests. An attacker could craft a malicious payload following this request that Pingora forwards to the backend in order to: * Bypass proxy-level ACL controls and WAF logic * Poison caches and upstream connections, causing subsequent requests from legitimate users to receive responses intended for smuggled requests * Perform cross-user attacks by hijacking sessions or smuggling requests that appear to originate from the trusted proxy IP Cloudflare's CDN infrastructure was not affected by this vulnerability, as its ingress proxy layers forwarded HTTP/1.1 requests only, rejected ambiguous framing such as invalid Content-Length values, and forwarded a single Transfer-Encoding: chunked header for chunked requests. Mitigation: Pingora users should upgrade to Pingora v0.8.0 or higher that fixes this issue by correctly parsing message length headers per RFC 9112 and strictly adhering to more RFC guidelines, including that HTTP request bodies are never close-delimited. As a workaround, users can reject certain requests with an error in the request filter logic in order to stop processing bytes on the connection and disable downstream connection reuse. The user should reject any non-HTTP/1.1 request, or a request that has invalid Content-Length, multiple Transfer-Encoding headers, or Transfer-Encoding header that is not an exact “chunked” string match.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2835 is an HTTP Request Smuggling vulnerability classified under CWE-444, discovered in Cloudflare's Pingora HTTP parser prior to version 0.8.0. The flaw stems from Pingora's incorrect handling of HTTP/1.0 request bodies, which it improperly allows to be close-delimited, and its flawed processing of multiple Transfer-Encoding headers. This leads to a desynchronization between Pingora’s interpretation of HTTP request framing and that of backend servers. Specifically, attackers can craft HTTP/1.0 requests with ambiguous or conflicting length indicators that cause Pingora to parse requests differently than the backend, enabling the injection of smuggled requests. This discrepancy can be exploited to bypass proxy-level access control lists (ACLs) and Web Application Firewall (WAF) protections, poison caches and upstream connections so that legitimate users receive malicious responses, and perform cross-user attacks by hijacking sessions or injecting requests that appear to originate from the trusted proxy IP address. Cloudflare’s own CDN infrastructure is not vulnerable because it strictly enforces HTTP/1.1 requests, rejects ambiguous framing such as invalid Content-Length headers, and only forwards a single Transfer-Encoding: chunked header for chunked requests. The vulnerability is rated critical with a CVSS 4.0 score of 9.3, reflecting its network attack vector, low complexity, no required privileges or user interaction, and high impact on integrity and availability. Mitigation involves upgrading to Pingora version 0.8.0 or later, which corrects the parsing logic to fully comply with RFC 9112, ensuring HTTP request bodies are never close-delimited and that Transfer-Encoding headers are strictly validated. As a temporary workaround, users can implement request filtering to reject non-HTTP/1.1 requests, requests with invalid Content-Length headers, multiple Transfer-Encoding headers, or Transfer-Encoding headers that do not exactly match “chunked”. This reduces the risk by preventing ambiguous request framing and disabling downstream connection reuse.
Potential Impact
The impact of CVE-2026-2835 is significant for organizations deploying standalone Pingora proxies in front of backend servers that accept HTTP/1.0 requests. Successful exploitation can allow attackers to bypass critical security controls such as ACLs and WAFs, undermining perimeter defenses. Cache poisoning and upstream connection poisoning can lead to widespread distribution of malicious or stale content to legitimate users, damaging trust and potentially enabling further attacks. Cross-user attacks facilitated by request smuggling can result in session hijacking, unauthorized actions, and data leakage. The vulnerability affects the integrity and availability of web services and can compromise confidentiality indirectly through session hijacking. Since no authentication or user interaction is required and the attack can be launched remotely over the network, the attack surface is broad. Although Cloudflare’s CDN is not affected, organizations using Pingora in custom or standalone deployments face a high risk. The absence of known exploits in the wild currently limits immediate threat but the critical severity and ease of exploitation mean attackers may develop exploits rapidly. The vulnerability could disrupt business operations, damage reputation, and lead to data breaches if unmitigated.
Mitigation Recommendations
To mitigate CVE-2026-2835, organizations should immediately upgrade all Pingora deployments to version 0.8.0 or later, which includes a fix that enforces strict RFC 9112-compliant parsing of HTTP message length headers and disallows close-delimited HTTP/1.0 request bodies. This upgrade is the most effective and comprehensive solution. As an interim measure, implement request filtering rules to reject any HTTP requests that are not HTTP/1.1, contain invalid or conflicting Content-Length headers, have multiple Transfer-Encoding headers, or have Transfer-Encoding headers that do not exactly match “chunked”. Additionally, disable downstream connection reuse to prevent persistent connection exploitation. Network monitoring should be enhanced to detect anomalous HTTP request patterns indicative of request smuggling attempts. Backend servers should be configured to reject ambiguous or malformed HTTP/1.0 requests where possible. Regularly audit proxy and backend configurations to ensure consistent HTTP parsing behavior and alignment with RFC standards. Finally, maintain awareness of threat intelligence updates for any emerging exploits targeting this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- cloudflare
- Date Reserved
- 2026-02-19T21:24:24.726Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a8c4c1d1a09e29cb83c419
Added to database: 3/4/2026, 11:48:17 PM
Last enriched: 3/12/2026, 8:22:27 PM
Last updated: 4/19/2026, 7:26:25 AM
Views: 222
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.