HTTP Request Smuggling Affecting cpp-httplib package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CONAN-CPPHTTPLIB-10734890
  • published14 Jul 2025
  • disclosed10 Jul 2025
  • creditsebastianosrt

Introduced: 10 Jul 2025

NewCVE-2025-53628  (opens in a new tab)
CWE-444  (opens in a new tab)

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

Affected versions of this package are vulnerable to HTTP Request Smuggling through the processing of chunked encoded requests in parse_header function. An attacker can manipulate request boundaries by injecting conflicting Content-Length or Transfer-Encoding headers via trailers which can lead to desynchronised request processing, smuggling malicious headers through trailers or bypassing IP-based access controls, authentication mechanisms, and rate limiting.

References

CVSS Base Scores

version 4.0
version 3.1