HTTP Request Smuggling Affecting undici package, versions <6.24.0>=7.0.0-alpha.1 <7.24.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.02% (4th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-UNDICI-15518061
  • published13 Mar 2026
  • disclosed12 Mar 2026
  • creditUnknown

Introduced: 12 Mar 2026

NewCVE-2026-1525  (opens in a new tab)
CWE-444  (opens in a new tab)

How to fix?

Upgrade undici to version 6.24.0, 7.24.0 or higher.

Overview

undici is an An HTTP/1.1 client, written from scratch for Node.js

Affected versions of this package are vulnerable to HTTP Request Smuggling in the processHeader() while handling HTTP/1.1 requests containing duplicate Content-Length headers with differing casing. An attacker can bypass access controls, poison caches, hijack credentials, or cause service disruption by sending specially crafted HTTP requests that are interpreted inconsistently by proxies and backend servers.

CVSS Base Scores

version 4.0
version 3.1