HTTP Request Smuggling Affecting org.http4s:http4s-ember-server_native0.4_2.12 package, versions [,0.23.31)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGHTTP4S-13019557
  • published24 Sept 2025
  • disclosed23 Sept 2025
  • creditsebastianosrt

Introduced: 23 Sep 2025

NewCVE-2025-59822  (opens in a new tab)
CWE-444  (opens in a new tab)

How to fix?

Upgrade org.http4s:http4s-ember-server_native0.4_2.12 to version 0.23.31 or higher.

Overview

Affected versions of this package are vulnerable to HTTP Request Smuggling due to improper parsing of the HTTP trailer section in the parse function. An attacker can bypass security controls, launch targeted attacks against users, or poison web caches by crafting specially formed HTTP requests that exploit the incorrect handling of trailer headers.

Note:

This is only exploitable if the application is deployed behind a reverse-proxy that forwards trailer headers.

References

CVSS Base Scores

version 4.0
version 3.1