PT-2026-32395 · Haproxy · Haproxy
Martino Spagnuolo
·
Published
2026-04-13
·
Updated
2026-04-17
·
CVE-2026-33555
CVSS v3.1
4.0
Medium
| AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
HAProxy versions 2.6 through 3.3.5
Description
The HTTP/3 parser fails to verify that the received body length aligns with a previously announced content-length when a stream is closed using a frame with an empty payload. This discrepancy can lead to desynchronization between the proxy and the backend server, potentially enabling request smuggling, which is a technique used to interfere with the way a website processes sequences of HTTP requests.
Recommendations
Update to version 3.3.6 or later.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Haproxy