HTTP Request Smuggling Affecting pingora-core package, versions <0.8.0


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-PINGORACORE-15426481
  • published5 Mar 2026
  • disclosed4 Mar 2026
  • creditUnknown

Introduced: 4 Mar 2026

NewCVE-2026-2835  (opens in a new tab)
CWE-444  (opens in a new tab)

How to fix?

Upgrade pingora-core to version 0.8.0 or higher.

Overview

pingora-core is a package containing Pingora's APIs and traits for the core network protocols.

Affected versions of this package are vulnerable to HTTP Request Smuggling via improper parsing of HTTP/1.0 request bodies and multiple Transfer-Encoding values. An attacker can bypass access controls, poison caches, hijack sessions, or perform cross-user attacks by sending specially crafted HTTP requests that desynchronize request framing between the proxy and backend servers.

Note:

This is only exploitable if deployed as a standalone proxy in front of backends that accept HTTP/1.0 requests. Cloudflare customers and Cloudflare's CDN infrastructure were not affected by this vulnerability, as its ingress proxy layers rejected ambiguous framing such as invalid Content-Length values and internally forwarded non-ambiguous message length framing headers.

CVSS Base Scores

version 4.0
version 3.1