Impact
Apache Traffic Server processes HTTP request bodies that use chunked transfer encoding. When a client delivers a malformed chunked message, the server misinterprets request boundaries, allowing the attack to smuggle a second request into the same flow. This flaw is an example of CWE‑444, a vulnerability arising from HTTP request smuggling that can subvert normal request handling.
Affected Systems
The affected releases are Apache Traffic Server 9.0.0 through 9.2.12 and 10.0.0 through 10.1.1. All builds of these versions that employ the default chunked parsing logic are vulnerable, affecting any installation exposed to untrusted HTTP traffic.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.5, indicating high severity, while the EPSS score is below 1% and no public exploitation has been seen. It is not listed in the CISA KEV catalog. No authentication or elevated privileges are required; any network client that can communicate with the server over HTTP can trigger the issue, making remote‑facing deployments especially at risk.
OpenCVE Enrichment
Debian DSA