HTTP Request Smuggling The advisory has been revoked - it doesn't affect any version of package python-werkzeug Open this link in a new tab

    Threat Intelligence

    EPSS 0.11% (44th percentile)
Expand this section
9.8 critical

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • published 27 May 2022
  • disclosed 25 May 2022


The Debian security team deemed this advisory irrelevant for Debian:11.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-werkzeug package and not the python-werkzeug package as distributed by Debian.

Improper parsing of HTTP requests in Pallets Werkzeug v2.1.0 and below allows attackers to perform HTTP Request Smuggling using a crafted HTTP request with multiple requests included inside the body. NOTE: the vendor's position is that this behavior can only occur in unsupported configurations involving development mode and an HTTP server from outside the Werkzeug project