Skip to content

Instantly share code, notes, and snippets.

@alon710
Created March 6, 2026 04:10
Show Gist options
  • Select an option

  • Save alon710/f1051479fb87de8c8546257a9f5b0646 to your computer and use it in GitHub Desktop.

Select an option

Save alon710/f1051479fb87de8c8546257a9f5b0646 to your computer and use it in GitHub Desktop.
CVE-2026-2835: CVE-2026-2835: HTTP Request Smuggling in Cloudflare Pingora - CVE Security Report

CVE-2026-2835: CVE-2026-2835: HTTP Request Smuggling in Cloudflare Pingora

CVSS Score: 9.3 Published: 2026-03-05 Full Report: https://cvereports.com/reports/CVE-2026-2835

Summary

A critical HTTP Request Smuggling vulnerability (CWE-444) exists in Cloudflare Pingora versions prior to 0.8.0. The vulnerability stems from non-compliant parsing of HTTP/1.0 request bodies and ambiguous 'Transfer-Encoding' headers. By crafting malicious HTTP requests that exploit these framing inconsistencies, unauthenticated attackers can desynchronize the proxy from backend servers, leading to cache poisoning, security control bypasses, and potential session hijacking.

TL;DR

Pingora < 0.8.0 improperly handles HTTP/1.0 bodies and Transfer-Encoding headers, allowing attackers to smuggle requests past the proxy. Fixed in v0.8.0.

Exploit Status: POC

Technical Details

  • CWE ID: CWE-444
  • Attack Vector: Network
  • CVSS v4.0: 9.3 (Critical)
  • EPSS Score: 0.00048 (14.80%)
  • Impact: Request Smuggling / Cache Poisoning
  • Fix Version: 0.8.0

Affected Systems

  • Cloudflare Pingora < 0.8.0
  • Applications built using pingora-core < 0.8.0
  • Pingora: < 0.8.0 (Fixed in: 0.8.0)

Mitigation

  • Upgrade Pingora framework to version 0.8.0
  • Enforce strict HTTP/1.1 compliance in upstream servers
  • Disable HTTP/1.0 support if not operationally required
  • Implement WAF rules to detect ambiguous Transfer-Encoding headers

Remediation Steps:

  1. Identify all services utilizing Pingora versions < 0.8.0.
  2. Update the pingora dependency in Cargo.toml to ^0.8.0.
  3. Rebuild and redeploy the affected services.
  4. Verify the fix by attempting to send requests with Transfer-Encoding: chunked, identity—the server should now reject them or process them strictly.

References


Generated by CVEReports - Automated Vulnerability Intelligence

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment