๐Ÿ” CVE Alert

CVE-2026-26365

MEDIUM 4.0
CVSS Score
4.0
EPSS Score
0.0%
EPSS Percentile
0th

Akamai Ghost on Akamai CDN edge servers before 2026-02-06 mishandles processing of custom hop-by-hop HTTP headers, where an incoming request containing the header "Connection: Transfer-Encoding" could result in a forward request with invalid message framing, depending on the Akamai processing path. This could result in the origin server parsing the request body incorrectly, leading to HTTP request smuggling.

CWE CWE-444
Vendor akamai
Product ghost
Published Feb 23, 2026
Last Updated Feb 23, 2026
Stay Ahead of the Next One

Get instant alerts for akamai ghost

Be the first to know when new medium vulnerabilities affecting akamai ghost are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Akamai / Ghost
0 < 2026-02-06

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
akamai.com: https://www.akamai.com/blog/security-research/cve-2026-26365-incorrect-processing-connection-transfer-encoding