HTTP Request Smuggling Affecting bandit package, versions >=0.6.4 <1.11.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.02% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-HEX-BANDIT-16346078
  • published3 May 2026
  • disclosed1 May 2026
  • creditPJUllrich

Introduced: 1 May 2026

NewCVE-2026-39805  (opens in a new tab)
CWE-444  (opens in a new tab)

How to fix?

Upgrade bandit to version 1.11.0 or higher.

Overview

bandit is a HTTP server for Plug and WebSock apps.

Affected versions of this package are vulnerable to HTTP Request Smuggling the get_content_length function in Bandit.Headers. An attacker can bypass content-length validation by sending multiple content-length headers, causing the server to accept an ambiguous request body length. This can lead to request desynchronization and incorrect request parsing, letting an attacker interfere with how downstream handlers process the request and potentially affect other users’ requests on the same connection.

CVSS Base Scores

version 4.0
version 3.1