Description
Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks. Versions 4.1.132.Final and 4.2.10.Final fix the issue.
Published: 2026-03-27
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: HTTP Request Smuggling via incorrect quoted‑string parsing
Action: Patch Immediately
AI Analysis

Impact

Netty versions prior to 4.1.132.Final and 4.2.10.Final parse quoted strings in HTTP/1.1 chunked transfer encoding extensions incorrectly, allowing attackers to smuggle requests between intermediaries. This weakness, identified as CWE‑444, can result in the server interpreting HTTP bodies in unintended ways, potentially causing data leakage, bypassing authentication, or enabling downstream attacks. The vulnerability grants attackers the possibility to alter the logical boundaries of HTTP messages, thereby compromising confidentiality, integrity, or availability of the affected application.

Affected Systems

The impacted library is Netty, used broadly in Java‑based applications for network I/O. Versions predating 4.1.132.Final for the 4.1 branch and 4.2.10.Final for the 4.2 branch are vulnerable. Applications incorporating these Netty releases, including those that embed them as dependencies in web servers, application servers, or microservice runtimes, are at risk. Upgrading to the patched release removes the flaw.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity, and the EPSS score of less than 1% suggests that exploit prevalence is low at present. The vulnerability is not listed in the CISA KEV catalog, implying no known mass exploitation. Attackers can remotely submit crafted HTTP requests with chunked encoding extensions to any publicly reachable service that uses the vulnerable Netty library. The attack vector is inferred to be remote network, as the flaw is triggered by externally supplied headers in a standard HTTP request. No specific mitigation was documented besides applying the fix; exploitation would require the ability to influence the request received by the server.

Generated by OpenCVE AI on March 31, 2026 at 04:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Netty to version 4.1.132.Final or later or 4.2.10.Final or later
  • Verify that all dependent libraries in the application tree reference the updated Netty release
  • If the application bundles Netty within a container or framework, update that container or framework to a version that includes the patched Netty release
  • After the upgrade, conduct security testing to confirm that request smuggling is no longer possible

Generated by OpenCVE AI on March 31, 2026 at 04:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-pwqr-wmgm-9rr8 Netty: HTTP Request Smuggling via Chunked Extension Quoted-String Parsing
History

Tue, 31 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Netty
Netty netty
Vendors & Products Netty
Netty netty

Sat, 28 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Description Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks. Versions 4.1.132.Final and 4.2.10.Final fix the issue.
Title Netty: HTTP Request Smuggling via Chunked Extension Quoted-String Parsing
Weaknesses CWE-444
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T13:55:47.863Z

Reserved: 2026-03-24T15:10:05.678Z

Link: CVE-2026-33870

cve-icon Vulnrichment

Updated: 2026-03-31T13:55:43.820Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T20:16:34.663

Modified: 2026-03-30T20:12:16.330

Link: CVE-2026-33870

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-27T19:54:15Z

Links: CVE-2026-33870 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:00:45Z

Weaknesses