Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4290-1 | python-h2 security update |
EUVD |
EUVD-2025-28631 | h2 allows HTTP Request Smuggling due to illegal characters in headers |
Github GHSA |
GHSA-847f-9342-265h | h2 allows HTTP Request Smuggling due to illegal characters in headers |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 26 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 26 Aug 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 26 Aug 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hyper
Hyper h2 |
|
| Vendors & Products |
Hyper
Hyper h2 |
Mon, 25 Aug 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | h2 is a pure-Python implementation of a HTTP/2 protocol stack. Prior to version 4.3.0, an HTTP/2 request splitting vulnerability allows attackers to perform request smuggling attacks by injecting CRLF characters into headers. This occurs when servers downgrade HTTP/2 requests to HTTP/1.1 without properly validating header names/values, enabling attackers to manipulate request boundaries and bypass security controls. This issue has been patched in version 4.3.0. | |
| Title | h2 allows HTTP Request Smuggling due to illegal characters in headers | |
| Weaknesses | CWE-93 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-26T19:14:49.643Z
Reserved: 2025-08-20T14:30:35.009Z
Link: CVE-2025-57804
Updated: 2025-08-26T19:14:23.223Z
Status : Awaiting Analysis
Published: 2025-08-25T21:15:37.983
Modified: 2025-08-26T13:41:58.950
Link: CVE-2025-57804
OpenCVE Enrichment
Updated: 2025-08-26T08:54:54Z
Debian DLA
EUVD
Github GHSA