JustAppSec
Back to news

Pingora fixes critical HTTP request smuggling in HTTP/1.0 parsing

1 min readPublished 04 Mar 2026Source: CVE Project (cvelistV5)

TL;DR — A critical HTTP request smuggling flaw in Pingora's HTTP/1.0 parser can desync proxy and backend request framing, enabling request routing attacks.

What happened

Pingora is Cloudflare's open-source Rust framework for building fast, reliable, and programmable HTTP proxy services. CVE-2026-2835 reports a critical HTTP request smuggling issue in the Pingora HTTP proxy framework. The vulnerability arises from allowing HTTP/1.0 request bodies to be close-delimited and from incorrect handling of multiple Transfer-Encoding values, causing Pingora's request framing to become inconsistent with backend servers.

Successful exploitation enables bypass of proxy-layer ACL/WAF logic, cache/upstream poisoning, and cross-user attacks that appear to originate from the trusted proxy IP.

HTTP request smuggling remains one of the highest-impact proxy vulnerabilities — Cloudflare notes their own CDN was not affected due to stricter ingress behavior, but standalone Pingora deployments are exposed. CVSS v4.0: 9.3 (Critical).

Who is impacted

  • Deployments running Pingora versions < 0.8.0.
  • Primary risk is for standalone Pingora deployments in front of backends accepting HTTP/1.0.

What to do now

  • Follow vendor remediation guidance and apply the latest patched release available at the time of writing.
  • If you cannot patch, implement request filtering to reject:
    • Any non-HTTP/1.1 request
    • Requests with invalid Content-Length
    • Requests with multiple Transfer-Encoding headers
    • Requests where Transfer-Encoding is not exactly chunked
  • The advisory recommends returning an error and disabling downstream connection reuse when applying the workaround.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.