Description
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.
Other, unsupported versions may also be affected.

Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.
Published: 2026-04-09
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: HTTP Request Smuggling
Action: Patch
AI Analysis

Impact

Inconsistent interpretation of HTTP requests in Apache Tomcat, arising from an invalid chunk extension in the request body, permits HTTP request smuggling. This flaw allows an attacker to craft requests that the server parses incorrectly, potentially causing the server to misinterpret request boundaries. The CVE description does not explicitly state what an attacker can achieve; however, it is inferred that such smuggling could lead to bypassing authentication checks, manipulation of forwarded headers, or injection of hidden traffic that might be leveraged for further attacks.

Affected Systems

Apache Tomcat releases from version 7.0.0 through 7.0.109, 8.5.0 through 8.5.100, 9.0.0.M1 through 9.0.115, 10.1.0-M1 through 10.1.52, and 11.0.0-M1 through 11.0.18 are affected. Unsupported older releases may also be vulnerable.

Risk and Exploitability

The vulnerability is exploitable over standard inbound HTTP traffic by sending crafted chunked requests that include an invalid chunk extension. EPSS data is not available and the issue is not listed in the CISA KEV catalog, but the nature of request smuggling indicates a significant risk. The lack of a defined CVSS score makes it difficult to quantify severity, but the potential impact on confidentiality, integrity, and availability suggests that patching should be prioritized.

Generated by OpenCVE AI on April 9, 2026 at 21:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a fixed Tomcat release, such as 11.0.20, 10.1.52, or 9.0.116, or any newer version that contains the fix.
  • Confirm that the upgraded Tomcat version is actively running and that web applications function correctly.
  • If an immediate upgrade is not possible, apply a web application firewall or reverse proxy that detects and blocks requests containing invalid chunk extensions; this mitigates the smuggling risk.
  • Continuously monitor HTTP traffic logs for anomalous patterns indicative of smuggling attempts and investigate any suspicious activity.

Generated by OpenCVE AI on April 9, 2026 at 21:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-563x-q5rq-57qp Apache Tomcat has an HTTP Request/Response Smuggling vulnerability
History

Fri, 10 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Fri, 10 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}

threat_severity

Low


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache tomcat
Vendors & Products Apache
Apache tomcat

Fri, 10 Apr 2026 00:30:00 +0000

Type Values Removed Values Added
References

Thu, 09 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109. Other, unsupported versions may also be affected. Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.
Title Apache Tomcat: Request smuggling via invalid chunk extension
Weaknesses CWE-444
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-04-10T18:33:49.308Z

Reserved: 2026-01-27T18:06:58.294Z

Link: CVE-2026-24880

cve-icon Vulnrichment

Updated: 2026-04-09T23:15:44.782Z

cve-icon NVD

Status : Received

Published: 2026-04-09T20:16:24.060

Modified: 2026-04-10T19:16:21.033

Link: CVE-2026-24880

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-09T19:12:10Z

Links: CVE-2026-24880 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:29:45Z

Weaknesses