Description
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.
Other, unsupported versions may also be affected.

Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.
Published: 2026-04-09
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: HTTP Request Smuggling
Action: Immediate Patch
AI Analysis

Impact

Tomcat versions 7 through 11 intentionally accept HTTP requests that contain an improperly formed chunk extension and process the boundaries of the request differently than expected. This ambiguity enables an attacker to smuggle a second request into the same connection, potentially allowing the attacker to bypass access controls, extract sensitive data, or redirect traffic. The flaw is classified as CWE‑444, indicating an inconsistency in HTTP request/response handling.

Affected Systems

Affected products are Apache Tomcat from the Apache Software Foundation. Vulnerable releases cover Tomcat 11.0.0‑M1 through 11.0.18, 10.1.0‑M1 through 10.1.52, 9.0.0‑M1 through 9.0.115, 8.5.0 through 8.5.100, and 7.0.0 through 7.0.109; older or unsupported releases may also be impacted.

Risk and Exploitability

The CVSS base score of 7.5 marks the bug as high severity, while the EPSS score of less than 1 % indicates a low likelihood of exploitation observed in the wild. The vulnerability is not cataloged in CISA's KEV database. Based on the description, it is inferred that attacks likely proceed over HTTP from a remote client, do not require prior authentication, and rely on the transmission of a crafted request that includes a malformed chunk extension to a Tomcat instance exposed to the internet.

Generated by OpenCVE AI on April 14, 2026 at 23:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch to upgrade to Tomcat 11.0.20, 10.1.52, or 9.0.116, the releases that contain the fixed logic.
  • If an upgrade is not immediately feasible, reduce exposure by restricting Tomcat to trusted internal networks or interfaces and block external traffic that is not strictly required.
  • Implement a WAF or IDS rule configured to detect and reject malformed HTTP chunk extensions, thereby mitigating request smuggling attempts while the fix is pending.

Generated by OpenCVE AI on April 14, 2026 at 23:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-563x-q5rq-57qp Apache Tomcat has an HTTP Request/Response Smuggling vulnerability
History

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*

Fri, 10 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Fri, 10 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}

threat_severity

Low


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache tomcat
Vendors & Products Apache
Apache tomcat

Fri, 10 Apr 2026 00:30:00 +0000

Type Values Removed Values Added
References

Thu, 09 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109. Other, unsupported versions may also be affected. Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.
Title Apache Tomcat: Request smuggling via invalid chunk extension
Weaknesses CWE-444
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-04-10T18:33:49.308Z

Reserved: 2026-01-27T18:06:58.294Z

Link: CVE-2026-24880

cve-icon Vulnrichment

Updated: 2026-04-09T23:15:44.782Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T20:16:24.060

Modified: 2026-04-14T20:02:48.987

Link: CVE-2026-24880

cve-icon Redhat

Severity : Low

Publid Date: 2026-04-09T19:12:10Z

Links: CVE-2026-24880 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:00:07Z

Weaknesses