Description
Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, when using Transfer-Encoding: chunked, if a chunk's size parsed to a value of 2^64 or larger, it would be truncated to a 64-bit integer. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.
Published: 2026-03-12
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Potential HTTP Request Smuggling
Action: Apply Patch
AI Analysis

Impact

Cap'n Proto implements a data interchange and RPC system that parses HTTP chunked transfer encoding. An integer overflow occurs when the parsed chunk size equals or exceeds 2^64; the value is truncated to a 64‑bit integer. This flaw can be leveraged for HTTP request or response smuggling, a technique that allows an attacker to deliver data that is interpreted differently by a server and a downstream proxy. The weakness is classified as an integer overflow (CWE‑190) and unsafe conversion (CWE‑197). The potential impact includes denial of service, bypassing of security controls, or information disclosure if the smuggled payload reaches a privileged component.

Affected Systems

All deployments of Cap'n Proto that use the Transfer‑Encoding: chunked mechanism and run a version older than 1.4.0 are affected. The product identifier is capnproto:capnproto. Specific sub‑versions are not enumerated, but any build released before the 1.4.0 update is vulnerable.

Risk and Exploitability

The CVSS base score is 6.3, indicating a medium severity. The EPSS score is below 1%, suggesting a low likelihood of real‑world exploitation, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is remote via crafted HTTP traffic that forces the Cap'n Proto library to parse an oversized chunked size. The vulnerability is exploitable when the library processes an HTTP request or response, which typically occurs in a remote context. No additional conditions or privileges are required beyond sending the malformed request.

Generated by OpenCVE AI on March 18, 2026 at 19:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Cap'n Proto to version 1.4.0 or later
  • If an upgrade cannot be performed immediately, disable or remove use of Transfer-Encoding: chunked for any paths that use Cap'n Proto
  • Verify that the upgrade or configuration change has been applied and that the system is no longer vulnerable

Generated by OpenCVE AI on March 18, 2026 at 19:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:capnproto:capnproto:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Sat, 14 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-190
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}

threat_severity

Moderate


Fri, 13 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Capnproto
Capnproto capnproto
Vendors & Products Capnproto
Capnproto capnproto

Thu, 12 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description Cap'n Proto is a data interchange format and capability-based RPC system. Prior to 1.4.0, when using Transfer-Encoding: chunked, if a chunk's size parsed to a value of 2^64 or larger, it would be truncated to a 64-bit integer. In theory, this bug could enable HTTP request/response smuggling. This vulnerability is fixed in 1.4.0.
Title Cap'n Proto: Integer overflow in KJ-HTTP chunk size
Weaknesses CWE-197
CWE-444
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Capnproto Capnproto
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-13T16:14:32.323Z

Reserved: 2026-03-11T14:47:05.684Z

Link: CVE-2026-32240

cve-icon Vulnrichment

Updated: 2026-03-13T16:14:28.903Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T20:16:05.190

Modified: 2026-03-18T17:01:14.163

Link: CVE-2026-32240

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-12T19:35:57Z

Links: CVE-2026-32240 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:54:52Z

Weaknesses