🔐 CVE Alert

CVE-2026-39805

UNKNOWN 0.0

CL.CL HTTP request smuggling via duplicate Content-Length in bandit

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Inconsistent Interpretation of HTTP Requests vulnerability in mtrudel bandit allows HTTP request smuggling via duplicate Content-Length headers. 'Elixir.Bandit.Headers':get_content_length/1 in lib/bandit/headers.ex uses List.keyfind/3, which returns only the first matching header. When a request contains two Content-Length headers with different values, Bandit silently accepts it, uses the first value to read the body, and dispatches the remaining bytes as a second pipelined request on the same keep-alive connection. RFC 9112 §6.3 requires recipients to treat this as an unrecoverable framing error. When Bandit sits behind a proxy that picks the last Content-Length value and forwards the request rather than rejecting it, an unauthenticated attacker can smuggle requests past edge WAF rules, path-based ACLs, rate limiting, and audit logging. This issue affects bandit: before 1.11.0.

CWE CWE-444
Vendor mtrudel
Product bandit
Published May 1, 2026
Stay Ahead of the Next One

Get instant alerts for mtrudel bandit

Be the first to know when new unknown vulnerabilities affecting mtrudel bandit are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

mtrudel / bandit
0 < 1.11.0
mtrudel / bandit
0 < 1.11.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/mtrudel/bandit/security/advisories/GHSA-c67r-gc9j-2qf7 cna.erlef.org: https://cna.erlef.org/cves/CVE-2026-39805.html osv.dev: https://osv.dev/vulnerability/EEF-CVE-2026-39805 github.com: https://github.com/mtrudel/bandit/commit/f2ca636eb6df385219957e8934e9fc6efa1630d1

Credits

Peter Ullrich Mat Trudel Jonatan Männchen