JustAppSec
Back to news

Pingora fixes critical HTTP request smuggling in HTTP/1.0 and Transfer-Encoding parsing (CVE-2026-2835)

What happened

A Cloudflare CNA CVE record for CVE-2026-2835 reports a critical HTTP Request Smuggling issue in the Pingora HTTP proxy framework affecting parsing of HTTP/1.0 requests and handling of Transfer-Encoding. The vulnerability arises from allowing HTTP/1.0 request bodies to be close-delimited and from incorrect handling of multiple Transfer-Encoding values, which can cause Pingora's request framing to become inconsistent with backend servers' interpretation.

Who is impacted

  • Deployments running Pingora versions < 0.8.0 are affected.
  • The CVE notes the primary risk is for standalone Pingora deployments in front of backends that accept HTTP/1.0 requests.
  • Successful exploitation may enable bypass of proxy-layer controls (ACL/WAF logic), cache/upstream poisoning, and cross-user impacts (e.g., attacks that appear to originate from the trusted proxy IP).

What to do now

  • Upgrade to Pingora v0.8.0 or higher.
  • If you cannot upgrade immediately, implement request filtering to reject:
    • Any non-HTTP/1.1 request
    • Requests with invalid Content-Length
    • Requests with multiple Transfer-Encoding headers
    • Requests where Transfer-Encoding is not exactly "chunked"
  • If applying the workaround, the CVE recommends returning an error in request-filter logic to stop processing bytes on the connection and disable downstream connection reuse.

Additional Information

  • CVE: CVE-2026-2835
  • CWE: CWE-444 (Inconsistent Interpretation of HTTP Requests)
  • The CVE record states Cloudflare's CDN infrastructure was not affected, citing stricter ingress proxy behavior (HTTP/1.1-only forwarding and stricter framing validation).
  • Severity in the CVE record is CVSS v4.0 base score 9.3 (CRITICAL).
Source: CVE Project (cvelistV5)
Published 04 Mar 2026

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.