🔐 CVE Alert

CVE-2026-2332

HIGH 7.4

HTTP Request Smuggling via Chunked Extension Quoted-String Parsing

CVSS Score
7.4
EPSS Score
0.0%
EPSS Percentile
0th

In Eclipse Jetty, the HTTP/1.1 parser is vulnerable to request smuggling when chunk extensions are used, similar to the "funky chunks" techniques outlined here: * https://w4ke.info/2025/06/18/funky-chunks.html * https://w4ke.info/2025/10/29/funky-chunks-2.html Jetty terminates chunk extension parsing at \r\n inside quoted strings instead of treating this as an error. POST / HTTP/1.1 Host: localhost Transfer-Encoding: chunked 1;ext="val X 0 GET /smuggled HTTP/1.1 ... Note how the chunk extension does not close the double quotes, and it is able to inject a smuggled request.

CWE CWE-444
Vendor eclipse foundation
Product eclipse jetty
Published Apr 14, 2026
Last Updated Apr 15, 2026
Stay Ahead of the Next One

Get instant alerts for eclipse foundation eclipse jetty

Be the first to know when new high vulnerabilities affecting eclipse foundation eclipse jetty are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

Eclipse Foundation / Eclipse Jetty
12.1.0 ≤ 12.1.6 12.0.0 ≤ 12.0.32 11.0.0 ≤ 11.0.27 10.0.0 ≤ 10.0.27 9.4.0 ≤ 9.4.59

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/jetty/jetty.project/security/advisories/GHSA-355h-qmc2-wpwf gitlab.eclipse.org: https://gitlab.eclipse.org/security/cve-assignment/-/issues/89

Credits

🔍 https://github.com/xclow3n