Impact
Apache Traffic Server is vulnerable to request smuggling when HTTP requests contain malformed chunked message bodies. The flaw allows an attacker to send specially crafted HTTP requests that the server interprets inconsistently, causing requests to be split or mis‑delivered to downstream services.
Affected Systems
The vulnerability exists in Apache Traffic Server versions 9.0.0 through 9.2.12 and 10.0.0 through 10.1.1. Users should upgrade to version 9.2.13 or 10.1.2, which contain the fix.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity vulnerability. No EPSS score is available, and the fault is not listed in the CISA KEV catalog, implying that publicly known exploitation has not been reported. Based on the description, the likely attack vector involves a malicious HTTP client on the network sending malformed chunked requests. Until the patch is applied, the risk remains moderate to high because the flaw permits manipulation of request routing that could compromise proper processing of client requests.
OpenCVE Enrichment