Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2026-2833

Опубликовано: 05 мар. 2026
Источник: nvd
CVSS3: 9.1
EPSS Низкий

Описание

An HTTP request smuggling vulnerability (CWE-444) was found in Pingora's handling of HTTP/1.1 connection upgrades. The issue occurs when a Pingora proxy reads a request containing an Upgrade header, causing the proxy to pass through the rest of the bytes on the connection to a backend before the backend has accepted the upgrade. An attacker can thus directly forward a malicious payload after a request with an Upgrade header to that backend in a way that may be interpreted as a subsequent request header, bypassing proxy-level security controls and enabling cross-user session hijacking.

Impact

This vulnerability primarily affects standalone Pingora deployments where a Pingora proxy is exposed to external traffic. An attacker could exploit this to:

  • Bypass proxy-level ACL controls and WAF logic

  • Poison caches and upstream connections, causing subsequent requests from legitimate users to receive responses intended for smuggled requests

  • Perform cross-user attacks by

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:cloudflare:pingora:*:*:*:*:*:*:*:*
Версия до 0.8.0 (исключая)

EPSS

Процентиль: 4%
0.00017
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-444

Связанные уязвимости

github
около 1 месяца назад

Pingora vulnerable to HTTP Request Smuggling via Premature Upgrade

EPSS

Процентиль: 4%
0.00017
Низкий

9.1 Critical

CVSS3

Дефекты

CWE-444