Description
An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received body length matches a previously announced content-length when the stream is closed via a frame with an empty payload. This can cause desynchronization issues with the backend server and could be used for request smuggling. The earliest affected version is 2.6.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Mon, 13 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received body length matches a previously announced content-length when the stream is closed via a frame with an empty payload. This can cause desynchronization issues with the backend server and could be used for request smuggling. The earliest affected version is 2.6. | |
| First Time appeared |
Haproxy
Haproxy haproxy |
|
| Weaknesses | CWE-130 | |
| CPEs | cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Haproxy
Haproxy haproxy |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-13T16:22:13.958Z
Reserved: 2026-03-22T00:00:00.000Z
Link: CVE-2026-33555
No data.
Status : Received
Published: 2026-04-13T17:16:28.237
Modified: 2026-04-13T17:16:28.237
Link: CVE-2026-33555
No data.
OpenCVE Enrichment
No data.
Weaknesses