{"api_version":"1","generated_at":"2026-04-15T06:30:46+00:00","cve":"CVE-2026-2332","urls":{"html":"https://cve.report/CVE-2026-2332","api":"https://cve.report/api/cve/CVE-2026-2332.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-2332","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-2332"},"summary":{"title":"HTTP Request Smuggling via Chunked Extension Quoted-String Parsing","description":"In Eclipse Jetty, the HTTP/1.1 parser is vulnerable to request smuggling when chunk extensions are used, similar to the \"funky chunks\" techniques outlined here:\n  *  https://w4ke.info/2025/06/18/funky-chunks.html\n\n  *  https://w4ke.info/2025/10/29/funky-chunks-2.html\n\n\nJetty terminates chunk extension parsing at \\r\\n inside quoted strings instead of treating this as an error.\n\n\nPOST / HTTP/1.1\nHost: localhost\nTransfer-Encoding: chunked\n\n1;ext=\"val\nX\n0\n\nGET /smuggled HTTP/1.1\n...\n\n\n\n\n\nNote how the chunk extension does not close the double quotes, and it is able to inject a smuggled request.","state":"PUBLISHED","assigner":"eclipse","published_at":"2026-04-14 12:16:21","updated_at":"2026-04-14 12:16:21"},"problem_types":["CWE-444","CWE-444 CWE-444 Inconsistent interpretation of HTTP requests ('HTTP Request/Response smuggling')"],"metrics":[{"version":"3.1","source":"emo@eclipse.org","type":"Secondary","score":"7.4","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"7.4","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","data":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/jetty/jetty.project/security/advisories/GHSA-355h-qmc2-wpwf","name":"https://github.com/jetty/jetty.project/security/advisories/GHSA-355h-qmc2-wpwf","refsource":"emo@eclipse.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://gitlab.eclipse.org/security/cve-assignment/-/issues/89","name":"https://gitlab.eclipse.org/security/cve-assignment/-/issues/89","refsource":"emo@eclipse.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-2332","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2332","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Eclipse Foundation","product":"Eclipse Jetty","version":"affected 12.1.0 12.1.6 semver","platforms":[]},{"source":"CNA","vendor":"Eclipse Foundation","product":"Eclipse Jetty","version":"affected 12.0.0 12.0.32 semver","platforms":[]},{"source":"CNA","vendor":"Eclipse Foundation","product":"Eclipse Jetty","version":"affected 11.0.0 11.0.27 semver","platforms":[]},{"source":"CNA","vendor":"Eclipse Foundation","product":"Eclipse Jetty","version":"affected 10.0.0 10.0.27 semver","platforms":[]},{"source":"CNA","vendor":"Eclipse Foundation","product":"Eclipse Jetty","version":"affected 9.4.0 9.4.59 semver","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"https://github.com/xclow3n","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"2332","cve":"CVE-2026-2332","epss":"0.000310000","percentile":"0.087050000","score_date":"2026-04-14","updated_at":"2026-04-15 00:18:06"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"collectionURL":"https://repo.maven.apache.org/maven2","defaultStatus":"unaffected","packageName":"pkg://maven/org.eclipse.jetty/jetty-http","product":"Eclipse Jetty","repo":"https://github.com/jetty/jetty.project","vendor":"Eclipse Foundation","versions":[{"lessThanOrEqual":"12.1.6","status":"affected","version":"12.1.0","versionType":"semver"},{"lessThanOrEqual":"12.0.32","status":"affected","version":"12.0.0","versionType":"semver"},{"lessThanOrEqual":"11.0.27","status":"affected","version":"11.0.0","versionType":"semver"},{"lessThanOrEqual":"10.0.27","status":"affected","version":"10.0.0","versionType":"semver"},{"lessThanOrEqual":"9.4.59","status":"affected","version":"9.4.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"https://github.com/xclow3n"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In Eclipse Jetty, the HTTP/1.1 parser is vulnerable to request smuggling when chunk extensions are used, similar to the \"funky chunks\" techniques outlined here:<br><ul><li><span>https://w4ke.info/2025/06/18/funky-chunks.html</span><br></li><li><span>https://w4ke.info/2025/10/29/funky-chunks-2.html</span></li></ul>Jetty terminates chunk extension parsing at&nbsp;<code>\\r\\n</code>&nbsp;inside quoted strings instead of treating this as an error.<br><br>\n<pre>POST / HTTP/1.1\nHost: localhost\nTransfer-Encoding: chunked\n\n1;ext=\"val\nX\n0\n\nGET /smuggled HTTP/1.1\n...\n</pre>\n\n<div><br>Note how the chunk extension does not close the double quotes, and it is able to inject a smuggled request.<br></div>"}],"value":"In Eclipse Jetty, the HTTP/1.1 parser is vulnerable to request smuggling when chunk extensions are used, similar to the \"funky chunks\" techniques outlined here:\n  *  https://w4ke.info/2025/06/18/funky-chunks.html\n\n  *  https://w4ke.info/2025/10/29/funky-chunks-2.html\n\n\nJetty terminates chunk extension parsing at \\r\\n inside quoted strings instead of treating this as an error.\n\n\nPOST / HTTP/1.1\nHost: localhost\nTransfer-Encoding: chunked\n\n1;ext=\"val\nX\n0\n\nGET /smuggled HTTP/1.1\n...\n\n\n\n\n\nNote how the chunk extension does not close the double quotes, and it is able to inject a smuggled request."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-444","description":"CWE-444 Inconsistent interpretation of HTTP requests ('HTTP Request/Response smuggling')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-14T10:59:10.193Z","orgId":"e51fbebd-6053-4e49-959f-1b94eeb69a2c","shortName":"eclipse"},"references":[{"tags":["third-party-advisory"],"url":"https://github.com/jetty/jetty.project/security/advisories/GHSA-355h-qmc2-wpwf"},{"tags":["issue-tracking"],"url":"https://gitlab.eclipse.org/security/cve-assignment/-/issues/89"}],"source":{"discovery":"UNKNOWN"},"title":"HTTP Request Smuggling via Chunked Extension Quoted-String Parsing","x_generator":{"engine":"Vulnogram 1.0.1"}}},"cveMetadata":{"assignerOrgId":"e51fbebd-6053-4e49-959f-1b94eeb69a2c","assignerShortName":"eclipse","cveId":"CVE-2026-2332","datePublished":"2026-04-14T10:59:10.193Z","dateReserved":"2026-02-11T09:56:25.879Z","dateUpdated":"2026-04-14T10:59:10.193Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-14 12:16:21","lastModifiedDate":"2026-04-14 12:16:21","problem_types":["CWE-444","CWE-444 CWE-444 Inconsistent interpretation of HTTP requests ('HTTP Request/Response smuggling')"],"metrics":{"cvssMetricV31":[{"source":"emo@eclipse.org","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":5.2}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"2332","Ordinal":"1","Title":"HTTP Request Smuggling via Chunked Extension Quoted-String Parsi","CVE":"CVE-2026-2332","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"2332","Ordinal":"1","NoteData":"In Eclipse Jetty, the HTTP/1.1 parser is vulnerable to request smuggling when chunk extensions are used, similar to the \"funky chunks\" techniques outlined here:\n  *  https://w4ke.info/2025/06/18/funky-chunks.html\n\n  *  https://w4ke.info/2025/10/29/funky-chunks-2.html\n\n\nJetty terminates chunk extension parsing at \\r\\n inside quoted strings instead of treating this as an error.\n\n\nPOST / HTTP/1.1\nHost: localhost\nTransfer-Encoding: chunked\n\n1;ext=\"val\nX\n0\n\nGET /smuggled HTTP/1.1\n...\n\n\n\n\n\nNote how the chunk extension does not close the double quotes, and it is able to inject a smuggled request.","Type":"Description","Title":"HTTP Request Smuggling via Chunked Extension Quoted-String Parsi"}]}}}